• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Threat Hunting

Results for "cyber threat hunting"


  • Status: Free Trial
    Free Trial
    I

    Infosec

    Python for Active Defense

    Skills you'll gain: Cyber Threat Hunting, Threat Detection, Endpoint Detection and Response, Cyber Security Strategy, System Monitoring, Cybersecurity, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Anomaly Detection, Scripting, Scripting Languages

    4.5
    Rating, 4.5 out of 5 stars
    ·
    83 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Healthcare Data Security, Privacy, and Compliance

    Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety

    4.8
    Rating, 4.8 out of 5 stars
    ·
    451 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Principios y Regulaciones de Seguridad de la Información

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    364 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Intrusion Detection

    Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    244 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    SIEM Splunk Hands-On Guide

    Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Computer Security Incident Management, Threat Detection, User Accounts, Data Transformation, Authorization (Computing), Cybersecurity, Machine Learning, Event Monitoring, Systems Administration, Security Management, Data Manipulation, Data Analysis, Statistical Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    409 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Preview
    Preview
    B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    234 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    SC-200 Microsoft Security Operations Analyst

    Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    T

    Technical University of Munich (TUM)

    Digitalisation in Space Research

    Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Aerospace Basic Quality System Standards, Manufacturing Processes, Image Analysis, Industrial Engineering, Cybersecurity, Spatial Data Analysis, Artificial Intelligence, Threat Detection, Automation, Cyber Risk, Telecommunications, Technology Strategies, Cloud Computing, Data Storage, Data Integration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    103 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Maryland, College Park

    Cybersecurity Capstone Project

    Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design

    4.3
    Rating, 4.3 out of 5 stars
    ·
    158 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    K

    Knowledge Accelerators

    Cybersecurity Awareness Essentials for Employees

    Skills you'll gain: Cyber Security Policies, AI Security, Mobile Security, Safety and Security, Identity and Access Management, Remote Access Systems, Multi-Factor Authentication, Artificial Intelligence

    4.9
    Rating, 4.9 out of 5 stars
    ·
    39 reviews

    Beginner · Course · 1 - 3 Months

1…303132…74

In summary, here are 10 of our most popular cyber threat hunting courses

  • Python for Active Defense: Infosec
  • Secure Coding Practices: University of California, Davis
  • Healthcare Data Security, Privacy, and Compliance: Johns Hopkins University
  • Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
  • Intrusion Detection: Johns Hopkins University
  • Application Security for Developers and DevOps Professionals: IBM
  • SIEM Splunk Hands-On Guide: EDUCBA
  • Kali Linux: Board Infinity
  • SC-200 Microsoft Security Operations Analyst: Packt
  • Digitalisation in Space Research: Technical University of Munich (TUM)

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok