Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability analysis and threat mitigation"
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Macquarie University
Skills you'll gain: Pivot Tables And Charts, Data Storytelling, Data Presentation, Power BI, Excel Formulas, Data Analysis Expressions (DAX), Data Visualization Software, Data Visualization, Interactive Data Visualization, Microsoft Excel, Spreadsheet Software, Dashboard, Data Modeling, Data Cleansing, Data Manipulation, Excel Macros, Infographics, Data Transformation, Data Validation, Data Warehousing
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Import/Export, Predictive Modeling, Web Scraping, Automation, Data Science, Python Programming
Skills you'll gain: Generative AI, Auditing, Compliance Auditing, Risk Analysis, Risk Management, Business Risk Management, Artificial Intelligence, Risk Mitigation, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Mathematical Theory & Analysis, Analysis, Probability, Design Strategies, Computer Science
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Statistical Methods, Statistical Inference, Data Access, Anomaly Detection, Statistical Analysis, Data Analysis, Data Cleansing, Data Manipulation, Data Science, Machine Learning, Probability & Statistics, Jupyter, Pandas (Python Package), Artificial Intelligence
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Routing, Debugging, Network Model, Bioinformatics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Epidemiology, C++ (Programming Language), Infectious Diseases, Computer Science
- Status: Free
Yale University
Skills you'll gain: Growth Mindedness, Optimism, Positive Behavior Support, Goal Setting, Resilience, Self-Motivation, Self-Awareness, Emotional Intelligence, Mental Health, Psychology, Social Skills, Decision Making, Time Management
Skills you'll gain: Data Storytelling, Data Presentation, Interactive Data Visualization, Data Visualization Software, Data Visualization, Shiny (R Package), Data Wrangling, Exploratory Data Analysis, Statistical Visualization, Relational Databases, Big Data, Ggplot2, Database Design, Data Analysis, Data Mining, Dashboard, Excel Formulas, Data Manipulation, Web Scraping, Microsoft Excel
In summary, here are 10 of our most popular vulnerability analysis and threat mitigation courses
- Play It Safe: Manage Security Risks: Google
- Excel Skills for Data Analytics and Visualization: Macquarie University
- Applied Data Science: IBM
- Auditing Generative AI: Strategy, Analysis & Risk Mitigation: ISACA
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Algorithms: Stanford University
- The Bits and Bytes of Computer Networking: Google
- Exploratory Data Analysis for Machine Learning: IBM
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization: DeepLearning.AI
- Data Structures and Algorithms: University of California San Diego