Filter by
The language used throughout the course, in both instruction and assessments.
Results for "advanced+threat+detection+and+hunting"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Splunk Inc.
Skills you'll gain: Splunk, Correlation Analysis, Data Transformation, Data Manipulation, Data Visualization Software, Performance Tuning, Statistical Methods, Dashboard, Statistical Analysis, Data Processing, Security Information and Event Management (SIEM), Data Analysis, Data Modeling, Ad Hoc Reporting, Time Series Analysis and Forecasting, Query Languages, Real Time Data, Data Cleansing, Transaction Processing, Incident Response
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Skills you'll gain: Clinical Trials, Pharmaceuticals, Patient Safety, Clinical Research, Competitive Intelligence, Medication Administration, Safety Assurance, Medical Science and Research, Bioinformatics, Healthcare Industry Knowledge, Risk Analysis, Process Development, New Product Development, Product Development, Regulatory Compliance, General Science and Research, Infectious Diseases, Product Testing, Science and Research, Manufacturing Processes
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
In summary, here are 10 of our most popular advanced+threat+detection+and+hunting courses
- Sound the Alarm: Detection and Response: Google
- Assets, Threats, and Vulnerabilities: Google
- Splunk Search Expert: Splunk Inc.
- Security Awareness Training: ISC2
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Introduction to the Threat Intelligence Lifecycle : IBM
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Drug Hunting: The Science of Making New Medicines: Novartis