Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
- Status: Free
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
- Status: Free
University of California San Diego
Skills you'll gain: Energy and Utilities, Electrical Power, Pollution Prevention, Environmental Policy, Mitigation, Environment, Social Studies, Food and Beverage, Environmental Regulations, Environmental Science, Economics, Chemical Engineering, Production Process, Biology
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Cyber Security Strategy, Security Awareness, Secure Coding, Data Encryption Standard, Technical Support and Services, Information Technology
- Status: Free
The Pennsylvania State University
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Microbiology, Public Health, Social Sciences, Community Health, Emerging Technologies, Mathematical Modeling, Molecular Biology
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, User Interface and User Experience (UI/UX) Design, Usability Testing, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
- Status: Free
University of Cape Town
Skills you'll gain: Economic Development, Environmental Policy, Environmental Issue, Mitigation, Policy Development, Policy Analysis, Socioeconomics, Mathematical Modeling, Systems Thinking, Economics, Research, Innovation
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Cybersecurity Awareness and Innovation: EIT Digital
- Cyber Security – Technology and Governance: University of London
- Cybersecurity Best Practices: Coursera Instructor Network
- Cyber Threats and Attack Vectors: University of Colorado System
- Our Energy Future: University of California San Diego
- AI for Cybersecurity: Johns Hopkins University
- Cybersecurity Fundamentals: IBM
- Epidemics - the Dynamics of Infectious Diseases: The Pennsylvania State University
- Secure Software Design: University of Colorado System
- Computer Security and Systems Management: University of Colorado System