Shiksha OnlineTechnology Technology
    Courses in Technology
  • Big Data
  • Cloud Technologies
  • Computer Science
  • Cybersecurity
  • Databases
  • IT Services
  • Masters and Certificate Programs
  • Networking and Hardware
  • Operating System
  • Programming
  • QA and Testing
  • Web Development
  • Software Tools
  • Career Guides
  • Learn why Cybersecurity is essential
  • Learn about the 4Vs of Big Data
  • An Ethical Hacker's guide for getting from beginner to professional
Data Science Data Science
    Courses in Data Science
  • Data Science Basics
  • Data Science for Healthcare
  • Deep Learning
  • Machine Learning
  • Career Guides
  • Learn more about different versions of Python
  • How to get started with Data Science?
  • Learn about the difference between AI and ML
  • What's New
  • How to Use Midjourney AI for Creating a Masterpiece Art?
  • Difference Between Probability and Non Probability Sampling
  • Conditional Statements in Python – Python Tutorial
  • Transportation Problem: Definition, Formulation, and Types
Management Management
    Courses in Management
  • Business Analytics
  • Business Tools
  • Communication
  • CSR
  • Entrepreneurship
  • Human Resources
  • Industry Programs
  • Logistics and Supply Chain
  • Marketing
  • Masters and PG-Management
  • Operations
  • Product Management
  • Strategy and Leadership
  • Project Management
  • Sales
  • Career Guides
  • What are the latest trends in Recruitment?
  • What are the traits required to become a successful Entrepreneur?
  • Your guide to become a Business Analyst
  • What's New
  • Top Digital Marketing Interview Questions and Answers
  • Top 91 Marketing Interview Questions and Answers in 2024
  • Top 57 MIS Executive Interview Questions and Answers
  • Henri Fayol’s 14 Principles of Management with Examples
Degree Programs Degree Programs
    Courses in Degree Programs
  • Bachelors Program
  • Masters Program
MoreMore
  • Study in India
  • Study Abroad
  • Finance
  • Creativity and Design
  • Emerging Technologies
  • Engineering-Non CS
  • Healthcare
  • Energy and Environment
  • Social Sciences
  • Personal Development
    Courses
Blog Blog
    Trending Articles
    Course Recommendations
  • What's New
  • NMIMS Online MBA in Financial Management: Admissions, Eligibility, Curriculum & Fees 2025
  • Consumer Awareness: Know Your Rights and Responsibilities
  • A Guide to Management Information Systems (MIS)
  • Difference Between RAM And ROM
  • Difference Between Assets and Liabilities
  • View All
Search Icon
LoginSign Up
Showing Results for threat hunting
name

Cyber Threat Hunting

InfosecCertificate
Free
7 hours
Intermediate
SnortLinuxEthical HackingNetworking+4 more
name

Advanced Threat Hunting and Incident Response

CourseraCertificate
Free
10 hours
– / –
NetworkingCyber SecuritySecurity
name

SC-200: Perform threat hunting in Microsoft Sentinel

MicrosoftCertificate
Free
3 hours
Intermediate
Digital marketingMarketingCyber SecurityOperations+1 more
name

Introduction to the Threat Landscape

FortinetCertificate
– / –
3 hours
– / –
Cyber Crime
name

Mastering Threat Intelligence

EC-CouncilCertificate
₹8.21 K
14 hours
– / –
Cyber LawCyber SecurityNetworkingSecurity
name

Certified Threat Intelligence Analyst

EC-CouncilCertificateStar Icon5.0
– / –
2 hours
Intermediate
Information SecurityEthical HackingCyber SecurityData Processing+3 more
name

Debugging: Hunting and Squashing Bugs

University of MichiganCertificate
– / –
25 hours
Intermediate
PythonSoftware Testing
name

Advanced Cyber Security Threats and Governance

Great LearningCertificateStar Icon5.0
Free
1 hours
Beginner
name

Threat Response

CISCO Regional Academy ( Centre for Electronic Governance)Certificate
Free
7 hours
– / –
NetworkingCCNAIP networkingLinux+3 more
name

Threat Analysis

CISCO Regional Academy ( Centre for Electronic Governance)Certificate
Free
26 hours
– / –
NetworkingCCNAIP networkingNetwork Security+4 more
name

Threat Investigation

CISCO Regional Academy ( Centre for Electronic Governance)Certificate
Free
8 hours
– / –
NetworkingIP networkingCCNANetwork Security+4 more
name

Website Hacking / Penetration Testing & Bug Bounty Hunting

UDEMYCertificateStar Icon5.0
– / –
1 hours
Beginner
Ethical HackingLinuxNetworking
name

Cyber Threat Intelligence

IBMCertificate
Free
29 hours
Beginner
Application SecurityEthical HackingCyber SecurityNetworking+1 more
name

Threat Modeling Security Fundamentals

MicrosoftCertificate
Free
3 hours
Beginner
NetworkingVISIOSTPSecurity
name

Operationalizing Cloud Security with Deepfence ThreatMapper

UDACITYCertificate
– / –
2 hours
Advanced
Cloud ComputingSecurity
name

Intro to Bug Bounty Hunting and Web Application Hacking

UDEMYCertificate
₹455
5 hours
– / –
Ethical Hacking
name

Cybersecurity Threat Vectors and Mitigation

MicrosoftCertificate
Free
7 hours
Beginner
Cyber SecurityCyber LawCompliancePhishing+1 more
name

MD 100 Configure threat protection

MicrosoftCertificate
Free
1 hours
Beginner
MS OfficeNetworkingCompliancePhishing
name

AWS: Threat Detection, Logging and Monitoring

CourseraCertificate
Free
5 hours
– / –
C
name

Introduction to the Threat Intelligence Lifecycle

IBMCertificate
Free
15 hours
Beginner
Cyber SecurityEthical HackingRisk ManagementNetworking+2 more
name

Security Features and Advanced Threat Prevention

Juniper NetworksCertificate
Free
7 hours
– / –
NetworkingSecurity
name

Real Time Cyber Threat Detection and Mitigation

New York UniversityCertificate
– / –
11 hours
Intermediate
Cyber SecurityNetwork SecurityCyber LawNetworking
name

Real-Time Cyber Threat Detection and Mitigation

New York UniversityCertificate
Free
15 hours
Intermediate
Cyber SecurityNetwork SecurityEthical HackingNetworking+1 more
name

Air Pollution - a Global Threat to our Health

University of CopenhagenCertificate
Free
12 hours
Beginner
name

Master of Science in Threat and Response Management

University of ChicagoCertificate
– / –
24 months
– / –
Risk ManagementCommunication skillsSecurity
name

Mpox: Understanding the Epidemiology and the Potential Threat

FutureLearnCertificate
₹1.93 K
2 weeks
– / –
name

MS 500 part 2 Implement and manage threat protection

MicrosoftCertificate
Free
5 hours
Intermediate
ExcelMS OfficeComplianceNetworking+1 more
name

Prepare for Microsoft 365 Copilot: Part 3 Threat protection

MicrosoftCertificate
Free
3 hours
Intermediate
Cyber LawCyber SecuritySimulation
name

MS-101 Implement threat protection by using Microsoft 365 Defender

MicrosoftCertificate
Free
3 hours
Intermediate
SimulationCyber SecurityCloud ServicesNetworking
name

MS-102 Implement threat protection by using Microsoft 365 Defender

MicrosoftCertificate
Free
3 hours
Intermediate
MS OfficeSimulationCyber Security
Working Man Illustration
Get personalised course recommendations
Registering gives you the benefit to browse variety of courses based on your preferences

Connect with us
facebookyoutubetwitterlinkedin
Shiksha Online
Get in touch
mailContact Us
Explore Websites
Free Online courses
Free Government courses
Data Science Courses
Artificial Intelligence Courses
Python Courses
Cybersecurity Courses
Digital Marketing Courses
Blog
Legal
Privacy policy
Terms and conditions
Grievances
infoedge

All trademarks are properties of their respective owners.

All rights reserved. @2026 Info Edge (India) Ltd

Partner sitesNaukri.comshikshaJeevansathi99acers