All current Threat Intelligence Courses courses in 2024
96 Courses
Advanced Threat Hunting and Incident Response
Advanced Threat Hunting and Incident Response
In the ever-evolving landscape of cybersecurity, organizations face escalating threats that demand advanced skills in threat hunting and incident response. This comprehensive course is designed to empower participants with advanced techniques to not only detect but effectively respond to cybersecurity.

Modelado de Amenazas - Threat Modeling
Modelado de Amenazas - Threat Modeling
Descubre el mundo del modelado de amenazas con nuestro curso especializado. Aprende a identificar, evaluar y mitigar riesgos utilizando las metodologías STRIDE y DREAD. Este curso incluye el uso práctico de herramientas como Microsoft Threat Modeling y OWASP Threat Dragon, esenciales para cualquier profesi.

Cyber Threat Intelligence
Cyber Threat Intelligence
This course offers the foundational knowledge required to develop Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. Participants will understand network defensive tactics, define network access control, and use network monitoring tools. Additionally, the course c.

Introduction to the Threat Intelligence Lifecycle
Introduction to the Threat Intelligence Lifecycle
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety.

Microsoft Office 365: Advanced Threat Protection (Office 365/Microsoft 365)
Microsoft Office 365: Advanced Threat Protection | LinkedIn Learning
Microsoft Office 365: Advanced Threat Protection
Protect your organization from cyber threats with our advanced course on Microsoft Office 365: Advanced Threat Protection, offered by LinkedIn Learning. Dive deep into stra.

SC-200: Mitigate threats using Microsoft Defender for Cloud
SC-200: Mitigate threats using Microsoft Defender for Cloud
Course: SC-200: Mitigate threats using Microsoft Defender for Cloud
Provider: Microsoft Learn
Categories: Threat Intelligence Courses, SC-200: Microsoft Security Operations Analyst Courses
Module 1: Plan for cloud workload protections using Microsoft Defender for Cloud
Upo.
Learn Ethical Hacking and Penetration Testing Online
Learn Ethical Hacking and Penetration Testing Online
Enhance your cybersecurity skills with our extensive online course on Ethical Hacking and Penetration Testing. This course is designed to provide you with in-depth knowledge and practical expertise in various areas of cybersecurity, including:
Threat Intelligenc.

Cibersegurança: Anatomia Clássica de um Ciberataque
Cibersegurança: Anatomia Clássica de um Ciberataque
O curso Cibersegurança: Anatomia Clássica de um Ciberataque explora o valor da inteligência para o controle de ameaças cibernéticas, evidenciando a importância de pensar a segurança da informação como um tema corporativo, que envolve todas as áreas da organização. Autor: Alvaro Luiz Massad Ma.

MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
The MITRE ATT&CK® framework helps the security community adopt a threat-informed mindset and better defend against real-world adversaries. For organizations just getting started, it isn't always clear how to adopt it. Concepts make sense, but implementation can be challeng.
Master Course in Cloud Security 3.0
Master Course in Cloud Security 3.0 | Udemy
Enhance your expertise in cloud security with the Master Course in Cloud Security 3.0 offered by Udemy. This comprehensive program delves into various aspects of cloud computing, including Cloud Storage, Cloud Architecture, and advanced Cloud Security. Learn to navigate the intricacies of AWS.
