Courses from 1000+ universities
The layoffs were announced yesterday by Coursera’s CEO, after a year marked by a 50% stock drop.
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn Threat Intelligence with paid and free online courses from Coursera, edX, Microsoft Learn, Trailhead and other top learning platforms around the world. Read reviews to decide if a class is right for you.
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.
You will understand network defensive tactics, define network access control and use network monito…
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With informatio…
In this course, we will describe security services such as Intrusion Prevention System (IPS), user-based firewalls, and how they are configured. You will be introduced to Juniper’s security features, such as antivirus, antispam, content filtering, and We…
This is a self-paced lab that takes place in the Google Cloud console. Work on a real life threat hunting scenario to learn how to successfully manage your threat intelligence data with Cortex XSOAR TIM and automate response actions using threat intel ma…
In this course, we use scenarios/examples to examine the threat of a cyber-attack and good practices on mitigating the risk.
The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors.
Check Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.This course includes these modules:
Running the Fir…
Harmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assu…
This learning path takes you through the four main phases of threat modeling, explains the differences between each data-flow diagram element, walks you through the threat modeling framework, recommends different tools and gives you a step-by-step guide…
Implement threat intelligence in Microsoft 365
Prepare for a career as a threat intelligence analyst.
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Get personalized course recommendations, track subjects and courses with reminders, and more.