• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Threat Hunting

Results for "cyber threat hunting"


  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Solutions and Microsoft Defender

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Cyber Threat Intelligence, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Endpoint Security, Threat Detection, Virtual Networking, Encryption, Event Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    172 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Certified in Cybersecurity

    Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Homeland Security and Cybersecurity

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    631 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Introduction to Ethical Hacking Principles

    Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, General Data Protection Regulation (GDPR), Responsible AI

    4.7
    Rating, 4.7 out of 5 stars
    ·
    96 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    ISC2 Systems Security Certified Practitioner (SSCP)

    Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring

    4.7
    Rating, 4.7 out of 5 stars
    ·
    286 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Preview
    Preview
    G

    Google

    Office of the CISO Institute: Cybersecurity Essentials

    Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Cyber Security Policies, Incident Response, Cyber Governance, Vulnerability Assessments, Network Security, Application Security, Cloud Security, Risk Management, Encryption, Authentications

    4.5
    Rating, 4.5 out of 5 stars
    ·
    83 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Introduction to Security Principles in Cloud Computing

    Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Google Cloud Platform, Network Security, Cloud Infrastructure, Data Security, Cloud Computing Architecture, IT Automation, General Networking, Cloud Technologies, Computer Networking, Infrastructure Security, Cybersecurity, Security Controls, Infrastructure as Code (IaC), Digital Transformation

    4.6
    Rating, 4.6 out of 5 stars
    ·
    297 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Maryland, College Park

    Hardware Security

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Exploit development, Cryptography, Encryption, Exploitation techniques, Technical Design, Emerging Technologies, System Design and Implementation

    4.3
    Rating, 4.3 out of 5 stars
    ·
    691 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Introduction to Cybersecurity for Business

    Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    Universiteit Leiden

    Security & Safety Challenges in a Globalized World

    Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance

    4.8
    Rating, 4.8 out of 5 stars
    ·
    467 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Security Operations Center (SOC)

    Skills you'll gain: Threat Detection, Workflow Management, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Computer Security Incident Management, Cyber Attacks, Infrastructure Security, Event Monitoring, Data Security, Performance Measurement, Automation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    342 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Preview
    Preview
    I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 3 Months

1…242526…74

In summary, here are 10 of our most popular cyber threat hunting courses

  • Cybersecurity Solutions and Microsoft Defender: Microsoft
  • Certified in Cybersecurity: ISC2
  • Homeland Security and Cybersecurity: University of Colorado System
  • Introduction to Ethical Hacking Principles: SkillUp
  • ISC2 Systems Security Certified Practitioner (SSCP): ISC2
  • Office of the CISO Institute: Cybersecurity Essentials: Google
  • Introduction to Security Principles in Cloud Computing: Google Cloud
  • Hardware Security: University of Maryland, College Park
  • Introduction to Cybersecurity for Business: University of Colorado System
  • Security & Safety Challenges in a Globalized World: Universiteit Leiden

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok