• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Threat Hunting

Results for "cyber threat hunting"


  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    A General Approach to Risk Management

    Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Continuous Improvement Process

    4.9
    Rating, 4.9 out of 5 stars
    ·
    45 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free
    Free
    D

    DeepLearning.AI

    Red Teaming LLM Applications

    Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, AI Security, Application Security, Risk Management Framework

    4.8
    Rating, 4.8 out of 5 stars
    ·
    55 reviews

    Beginner · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Intrusion Detection Systems (IDS)

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Manage Security Operations

    Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages

    4.6
    Rating, 4.6 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Vulnerability Types and Concepts

    Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    S

    SkillUp

    Practice Exam for ISC2 Certified in Cybersecurity (CC)

    Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption

    4.6
    Rating, 4.6 out of 5 stars
    ·
    43 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Establishing Command-and-Control and Finding Credentials

    Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, System Monitoring, Systems Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    27 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Cybersecurity Foundations: Threats Networks, and IoT Protection

    Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Azure Cybersecurity Solutions And Microsoft Defender

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Virtual Machines, Encryption, Event Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security in Google Cloud en Français

    Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Kubernetes, Cloud Security, Cloud Applications, Generative AI, Cloud Storage, Encryption, OAuth, Security Controls, Virtual Machines, Network Infrastructure, Cloud Computing, Authorization (Computing), Threat Management, Data Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    86 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Protection of Information Assets

    Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Quantum Management

    Skills you'll gain: Threat Management, Threat Detection, Security Controls, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Identity and Access Management, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation

    Beginner · Course · 1 - 3 Months

1…464748…74

In summary, here are 10 of our most popular cyber threat hunting courses

  • A General Approach to Risk Management: Kennesaw State University
  • Red Teaming LLM Applications: DeepLearning.AI
  • Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
  • Manage Security Operations: Microsoft
  • Vulnerability Types and Concepts: Packt
  • Practice Exam for ISC2 Certified in Cybersecurity (CC): SkillUp
  • Establishing Command-and-Control and Finding Credentials: Infosec
  • Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
  • Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
  • Security in Google Cloud en Français: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok