All current Threat Intelligence Courses courses in 2024
100 Courses
SolarWinds Security Event Manager (SIEM) Network Security
Boost your security skills with the SolarWinds Security Event Manager (SIEM) course on Udemy. This essential course equips you to monitor networks effectively and respond swiftly to potential threats using SEM. With a full hands-on lab, you'll gain practical experience to enhance your proficiency in threat detection and management.
Join.

Modelado de Amenazas - Threat Modeling
Modelado de Amenazas - Threat Modeling
Descubre el mundo del modelado de amenazas con nuestro curso especializado. Aprende a identificar, evaluar y mitigar riesgos utilizando las metodologías STRIDE y DREAD. Este curso incluye el uso práctico de herramientas como Microsoft Threat Modeling y OWASP Threat Dragon, esenciales para cualquier profesi.

Cyber Threat Intelligence
Cyber Threat Intelligence
This course offers the foundational knowledge required to develop Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. Participants will understand network defensive tactics, define network access control, and use network monitoring tools. Additionally, the course c.

Introduction to the Threat Intelligence Lifecycle
Introduction to the Threat Intelligence Lifecycle
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety.

Microsoft Office 365: Advanced Threat Protection (Office 365/Microsoft 365)
Microsoft Office 365: Advanced Threat Protection | LinkedIn Learning
Microsoft Office 365: Advanced Threat Protection
Protect your organization from cyber threats with our advanced course on Microsoft Office 365: Advanced Threat Protection, offered by LinkedIn Learning. Dive deep into stra.

SC-200: Mitigate threats using Microsoft Defender for Cloud
SC-200: Mitigate threats using Microsoft Defender for Cloud
Course: SC-200: Mitigate threats using Microsoft Defender for Cloud
Provider: Microsoft Learn
Categories: Threat Intelligence Courses, SC-200: Microsoft Security Operations Analyst Courses
Module 1: Plan for cloud workload protections using Microsoft Defender for Cloud
Upo.
Advanced Threat Hunting and Incident Response
Advanced Threat Hunting and Incident Response
In the ever-evolving landscape of cybersecurity, organizations face escalating threats that demand advanced skills in threat hunting and incident response. This comprehensive course is designed to empower participants with advanced techniques to not only detect but effectively respond to cybersecurity.

Generative AI: Boost Your Cybersecurity Career
This short course provides cybersecurity professionals and enthusiasts with the latest Generative AI tools to address complex cybersecurity challenges. The course focuses on combating the exploitation of undetected vulnerabilities for which organizations increasingly turn to Artificial Intelligence (AI) and Machine Learning (ML).
Generative A.

Automated Cyber Security Incident Response
Automated Cyber Security Incident Response
This course aims to provide participants with a comprehensive understanding of incident response processes and workflows. The course covers various aspects of automating incident response mechanisms, including centralizing and automating operations, scaling the alert management process, and advanced top.

Learn Ethical Hacking and Penetration Testing Online
Learn Ethical Hacking and Penetration Testing Online
Enhance your cybersecurity skills with our extensive online course on Ethical Hacking and Penetration Testing. This course is designed to provide you with in-depth knowledge and practical expertise in various areas of cybersecurity, including:
Threat Intelligenc.
