Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
Rutgers the State University of New Jersey
Skills you'll gain: Supplier Quality Management, Procurement, Strategic Sourcing, Enterprise Resource Planning, Purchasing, Environmental Social And Corporate Governance (ESG), Strategic Partnership, Business Risk Management, Key Performance Indicators (KPIs), Supplier Relationship Management, Supply Chain, Risk Management, Derivatives, Organizational Structure, Consolidation, Target Audience, Talent Management, Robotic Process Automation, Supply Chain Management, Risk Mitigation
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Scripting, Vulnerability Assessments, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Firewall, Application Security, Web Applications, Data Ethics, Email Security, Computer Security Awareness Training, Malware Protection
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Environment, Environmental Science, Environmental Issue, Corporate Sustainability, Pollution Prevention, Energy and Utilities, Mitigation, Environmental Policy, Environmental Engineering, Education and Training
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Network Monitoring
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Security Strategy, Intrusion Detection and Prevention, Data Security, Security Controls
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
Alberta Machine Intelligence Institute
Skills you'll gain: Feature Engineering, Data Quality, Data Processing, Supervised Learning, Data Validation, Data Cleansing, Data Transformation, Verification And Validation, Applied Machine Learning, Machine Learning, Unsupervised Learning, Machine Learning Algorithms, Exploratory Data Analysis
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Microsoft SQL Servers, Data Encryption Standard, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Threat Modeling, Identity and Access Management, Firewall
- Status: New
Skills you'll gain: Security Management, Incident Management, Threat Management, Compliance Management, Regulatory Compliance, Risk Management, Security Strategy, Cybersecurity, Cyber Security Policies, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Governance, Security Awareness, Disaster Recovery, Business Continuity, Organizational Strategy
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Advanced Global Procurement and Sourcing:Â Rutgers the State University of New Jersey
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- The Total Data Quality Framework:Â University of Michigan
- Introduction to Carbon Reduction and Net Zero:Â Coursera Instructor Network
- In the Trenches: Security Operations Center :Â EC-Council
- Seguridad en la red:Â Universidad de los Andes
- A General Approach to Risk Management:Â Kennesaw State University
- Advanced Risk Management, Security Controls & Monitoring:Â Packt
- Data for Machine Learning:Â Alberta Machine Intelligence Institute