In today’s rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated and elusive. Attackers employ advanced techniques to infiltrate systems, often bypassing traditional security measures. For security professionals, this presents a significant challenge: how can we defend against threats that are designed to evade detection? The answer lies in integrating data science with modern security practices.

Threat Hunting Techniques

Gain insight into a topic and learn the fundamentals.
Intermediate level
Recommended experience
9 hours to complete
Flexible schedule
Learn at your own pace
What you'll learn
Explore the threat hunting lifecycle and how ML augments hypothesis-driven investigation.
Analyze raw log data by cleaning, enriching, and visualizing it using Pandas, Seaborn, and Matplotlib in Jupyter.
Apply anomaly detection techniques such as Isolation Forest and DBSCAN on telemetry data.
Design and execute a complete ML-based hunt in Splunk and Jupyter to detect suspicious behavior.
Skills you'll gain
Tools you'll learn
Details to know

Shareable certificate
Add to your LinkedIn profile
Assessments
4 assignments
Taught in English
Recently updated!
December 2025
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
Instructors


Offered by
Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

