Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "advanced+threat+detection+and+hunting"
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Cloud Services, Security Strategy, Security Controls, Cloud Computing Architecture, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Data Security, Security Management, Threat Detection, Identity and Access Management
Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Security Controls, Records Management, Windows PowerShell, Role-Based Access Control (RBAC), System Configuration, Security Management, System Monitoring, Data Security
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Skills you'll gain: Selenium (Software), Test Automation, Test Case, Software Testing, Application Frameworks, Web Scraping, Cascading Style Sheets (CSS), Javascript and jQuery, Debugging, Python Programming, Hypertext Markup Language (HTML)
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Skills you'll gain: Network Troubleshooting, Network Security, Network Administration, Virtual Private Networks (VPN), Remote Access Systems, Hardening, Computer Networking, TCP/IP, Security Controls, Enterprise Security, Network Protocols, Authentications, Encryption, Wireless Networks, Network Analysis, Command-Line Interface
Skills you'll gain: Network Security, Hardening, Endpoint Security, Virtual Private Networks (VPN), Firewall, Cloud Security, Infrastructure Security, Cybersecurity, Cloud Computing, Role-Based Access Control (RBAC), Network Infrastructure, Identity and Access Management, Security Controls, Enterprise Security, System Configuration, Email Security, Wide Area Networks
In summary, here are 10 of our most popular advanced+threat+detection+and+hunting courses
- Advanced Network Security and Analysis: Johns Hopkins University
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Securing Cloud and Hybrid Networks: LearnQuest
- MS Teams – Security, Compliance, and Advanced Administration: Packt
- Cyber Threats and Attack Vectors: University of Colorado System
- Advanced Selenium Techniques and Framework Introduction: Packt
- Systems and Application Security: ISC2
- Risk Identification, Monitoring, and Analysis: ISC2