• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Threat Hunting

Results for "cyber threat hunting"


  • Status: Preview
    Preview
    E

    Erasmus University Rotterdam

    Cybersecurity in Healthcare (Hospitals & Care Centres)

    Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    399 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Detect, Respond, and Recover from Cloud Cybersecurity Attacks

    Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management

    3.8
    Rating, 3.8 out of 5 stars
    ·
    36 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Introduction to Risk Management

    Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Disaster Recovery, Security Controls

    4.7
    Rating, 4.7 out of 5 stars
    ·
    153 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to AI for Cybersecurity

    Skills you'll gain: AI Security, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Anomaly Detection, Natural Language Processing, Machine Learning

    4.2
    Rating, 4.2 out of 5 stars
    ·
    85 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Introduction to Ethical Hacking and Recon Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cybersecurity, Vulnerability Scanning, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    605 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    2

    28DIGITAL

    Cybersecurity Awareness and Innovation

    Skills you'll gain: Computer Security Awareness Training, Cyber Risk, User Accounts, Exploitation techniques

    4.6
    Rating, 4.6 out of 5 stars
    ·
    778 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Microsoft SC-900 Exam Preparation and Practice

    Skills you'll gain: Azure Active Directory, Active Directory, Regulatory Compliance, Security Controls, Identity and Access Management, Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Threat Detection, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    157 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Secure Software Design

    Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Data Flow Diagrams (DFDs), Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Development Life Cycle, Technical Design

    4.6
    Rating, 4.6 out of 5 stars
    ·
    438 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cybersecurity Leadership and Management

    Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, IT Management, Cybersecurity, Information Systems Security, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Information Assurance, Key Performance Indicators (KPIs), Leadership and Management, Leadership, Technical Communication

    4.5
    Rating, 4.5 out of 5 stars
    ·
    139 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Management and Compliance

    Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Threat Management, Disaster Recovery, Data Governance, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    144 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Database Essentials and Vulnerabilities

    Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    58 reviews

    Beginner · Course · 1 - 3 Months

1…252627…74

In summary, here are 10 of our most popular cyber threat hunting courses

  • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
  • Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
  • Introduction to Risk Management: University of California, Irvine
  • Introduction to AI for Cybersecurity: Johns Hopkins University
  • Introduction to Ethical Hacking and Recon Techniques: Packt
  • Ethical Hacking Essentials (EHE): EC-Council
  • Cybersecurity Awareness and Innovation: 28DIGITAL
  • Microsoft SC-900 Exam Preparation and Practice: Microsoft
  • Secure Software Design: University of Colorado System
  • Cybersecurity Leadership and Management: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok