Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
Skills you'll gain: Business Continuity Planning, Continuous Monitoring, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Risk Management, Risk Analysis, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
- Status: New
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cloud Computing, Zero Trust Network Access, Cybersecurity, Network Security, Cyber Security Assessment, Threat Detection, Mobile Security, Hardening, Security Controls, Disaster Recovery, Authentications
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Security Engineering, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
- Status: New
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Cyber Risk, Multi-Factor Authentication, Authorization (Computing)
Palo Alto Networks
Skills you'll gain: Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Security Engineering, Continuous Monitoring, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Data Lakes
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
Skills you'll gain: Incident Response, Incident Management, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Computer Security Awareness Training, Culture Transformation, Threat Detection, Organizational Change, Employee Training, Employee Engagement, Communication Strategies
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Skills you'll gain: Program Management, Project Closure, Stakeholder Management, Scheduling, Project Schedules, Project Management Life Cycle, Project Controls, Stakeholder Communications, Risk Mitigation, Project Management Office (PMO), Risk Analysis, Risk Management, Benefits Administration, Project Management, Governance, Organizational Strategy, Program Evaluation, Strategic Communication, Quality Management, Project Management Institute (PMI) Methodology
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Security and Risk Management:Â Packt
- Cybersecurity Testing and Prevention:Â Microsoft
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Software Design Threats and Mitigations:Â University of Colorado System
- Security Fundamentals and Identity Management:Â Packt
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Advanced System Security Design:Â University of Colorado System
- The Cybersecurity Culture Blueprint: A Proactive Approach:Â LearnQuest
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University