Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Fred Hutchinson Cancer Center
Skills you'll gain: Data Ethics, Technology Strategies, Artificial Intelligence, Business Ethics, Business Leadership, Strategic Leadership, Artificial Intelligence and Machine Learning (AI/ML), Project Management, Organizational Leadership, Law, Regulation, and Compliance, Resource Allocation, Ethical Standards And Conduct, Regulation and Legal Compliance, Decision Making, Generative AI, Applied Machine Learning, Information Privacy
- Status: Free
Princeton University
Skills you'll gain: Risk Analysis, Network Analysis, Systems Thinking, World History, International Relations, Financial Systems, Public Health, Governance, Epidemiology, Complex Problem Solving, Economics, Supply Chain
Politecnico di Milano
Skills you'll gain: Water Resources, Environmental Engineering, Civil Engineering, Waste Minimization, Environmental Resource Management, Public Works, Mitigation, Landscape Architecture, Environmental Science
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Law, Regulation, and Compliance, Regulatory Requirements, Compliance Management, Compliance Reporting, Governance, Business Risk Management, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Compliance Auditing, Data Governance, Artificial Intelligence, Large Language Modeling, Threat Detection, Advanced Analytics
SkillUp EdTech
Skills you'll gain: Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Cybersecurity, Simulations, Security Testing, Network Security, Risk Management Framework
Google Cloud
Skills you'll gain: Cyber Operations, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Vulnerability Management, Business Continuity, Cyber Security Assessment, Business Risk Management, Risk Mitigation, Risk Management, Threat Detection, Incident Response, Security Management, Disaster Recovery, Business Analysis
- Status: Free
Skills you'll gain: Network Troubleshooting, Network Security, OSI Models, Network Monitoring, Network Performance Management, Network Architecture, Computer Networking, TCP/IP, General Networking, Local Area Networks, Cybersecurity, Network Analysis, Network Protocols, Network Infrastructure, Software-Defined Networking, Network Routers, Network Switches
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Web Servers, Servers, Web Applications
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Vulnerability Management, Security Testing, Network Security, Threat Detection, Operating Systems, Technical Services
- Status: New
Skills you'll gain: Penetration Testing, Incident Response, Network Security, Intrusion Detection and Prevention, Cybersecurity, Computer Security Incident Management, Application Security, Open Web Application Security Project (OWASP), Information Systems Security, Identity and Access Management, Vulnerability Assessments, Security Strategy, Cryptography, Security Testing, Secure Coding, Encryption, Risk Management Framework, Command-Line Interface, Virtual Private Networks (VPN), Threat Management
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- AI for Decision Makers:Â Fred Hutchinson Cancer Center
- Global Systemic Risk :Â Princeton University
- Sustainable Urban Water Systems:Â Politecnico di Milano
- Tools for Security Specialists:Â Codio
- GenAI for Fraud Detection and Compliance:Â Coursera Instructor Network
- Practice Exam for ISC2 Certified in Cybersecurity (CC):Â SkillUp EdTech
- Modern Security Operations:Â Google Cloud
- IT Risk Assessment Practices:Â Packt
- Introduction to Data Networks and the Internet - Bachelor's:Â Illinois Tech
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes