All current Threat Intelligence Courses courses in 2024
90 Courses
Cyber Threat Intelligence
Cyber Threat Intelligence
This course offers the foundational knowledge required to develop Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. Participants will understand network defensive tactics, define network access control, and use network monitoring tools. Additionally, the course c.
Coursera
Free Online Course (Audit)
25 hours
On-Demand
Microsoft Azure Security Center: Securing Cloud Resources
Keep your cloud resources secure with Microsoft Azure Security Center. Explore how to work with the console, set up resources, leverage advanced cloud defense capabilities, and more.
LinkedIn Learning
Free Trial Available
1-2 hours
On-Demand
MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training
This journey begins with the MITRE ATT&CK® framework, a globally-accessible knowledge base and model for cyber adversary behavior based on real-world observations. ATT&CK® Fundamentals will not only familiarize you with how the ATT&CK® knowledge base documents real-world adversary tactics, techniques, and procedures (TTPs), but also introduce the.
Cybrary
Paid Course
1-2 hours
On-Demand
Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel
Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel
Azure Sentinel delivers intelligent security analytics and threat intelligence, offering a unified solution for alerts, threat visibility, proactive hunting, and threat response. This course, Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel, will tea.
Pluralsight
Free Trial Available
48 minutes
On-Demand
Master Course in Cloud Security 3.0
Master Course in Cloud Security 3.0 | Udemy
Enhance your expertise in cloud security with the Master Course in Cloud Security 3.0 offered by Udemy. This comprehensive program delves into various aspects of cloud computing, including Cloud Storage, Cloud Architecture, and advanced Cloud Security. Learn to navigate the intricacies of AWS.
Udemy
Paid Course
1 hour 13 minutes
On-Demand
Modelado de Amenazas - Threat Modeling
Modelado de Amenazas - Threat Modeling
Descubre el mundo del modelado de amenazas con nuestro curso especializado. Aprende a identificar, evaluar y mitigar riesgos utilizando las metodologías STRIDE y DREAD. Este curso incluye el uso práctico de herramientas como Microsoft Threat Modeling y OWASP Threat Dragon, esenciales para cualquier profesi.
Udemy
Paid Course
4-5 hours
On-Demand
SC-200: Mitigate threats using Microsoft Defender for Cloud
SC-200: Mitigate threats using Microsoft Defender for Cloud
Course: SC-200: Mitigate threats using Microsoft Defender for Cloud
Provider: Microsoft Learn
Categories: Threat Intelligence Courses, SC-200: Microsoft Security Operations Analyst Courses
Module 1: Plan for cloud workload protections using Microsoft Defender for Cloud
Upo.
Microsoft Learn
Free Online Course
4 hours 17 minutes
On-Demand
Generative AI: Boost Your Cybersecurity Career
This short course provides cybersecurity professionals and enthusiasts with the latest Generative AI tools to address complex cybersecurity challenges. The course focuses on combating the exploitation of undetected vulnerabilities for which organizations increasingly turn to Artificial Intelligence (AI) and Machine Learning (ML).
Generative A.
Coursera
Free Online Course (Audit)
10 hours
On-Demand
Advanced Threat Hunting and Incident Response
Advanced Threat Hunting and Incident Response
In the ever-evolving landscape of cybersecurity, organizations face escalating threats that demand advanced skills in threat hunting and incident response. This comprehensive course is designed to empower participants with advanced techniques to not only detect but effectively respond to cybersecurity.
Coursera
Free Online Course (Audit)
10 hours
On-Demand
Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Red team operations are most effective when tailored to test an organization's defenses against the most likely threat. Learn to leverage MITRE ATT&CK in combination with open source tools in the red team tools path to emulate APT attacks.Resources and time are limited and validation of security operations capabilities and defenses is elusive if no.
Pluralsight
Free Trial Available
On-Demand