Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Network Architecture, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Data Governance, Descriptive Analytics, Data Storytelling, Supply Chain Management, Demand Planning, Presentations, Supply Chain Systems, Supply Chain Planning, Process Improvement, Data Management, Data Lakes, Predictive Analytics, Customer Demand Planning, Forecasting, Data Analysis, Data Analysis Software, Real Time Data, Data Visualization Software, Inventory Management System, Capacity Planning
What brings you to Coursera today?
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Configuration Management, Cybersecurity, Security Management, Cyber Attacks, Computer Security Awareness Training, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Threat Detection, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Infrastructure Security, Telecommunications, Computer Security Awareness Training, Threat Detection, Enterprise Security, Security Awareness, General Networking, Data Security, Vulnerability, Public Safety and National Security, Governance, Political Sciences
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Technical Support, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Data Storage, Software Development Life Cycle, Cyber Attacks, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills, Computer Hardware
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Skills you'll gain: Cybersecurity, Cyber Attacks, Security Awareness, Hardening, Data Security, Computer Security Awareness Training, Network Security, Personally Identifiable Information, Information Systems Security, Security Controls, Threat Management, Malware Protection, Information Privacy, Encryption, Multi-Factor Authentication
- Status: New
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Crisis Management, Productivity, Incident Response, AI Personalization, OpenAI, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Expense Management, Threat Modeling, Creative Thinking, Cyber Security Strategy
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Google Cybersecurity:Â Google
- Introduction to Cyber Security:Â New York University
- Microsoft Cybersecurity Analyst:Â Microsoft
- IT Fundamentals for Cybersecurity:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Unilever Supply Chain Data Analyst:Â Unilever
- Certified in Cybersecurity:Â ISC2
- Cybersecurity for Everyone:Â University of Maryland, College Park
- IBM IT Support:Â IBM
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM