Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability analysis and threat mitigation"
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Debugging, Supervised Learning, Data-Driven Decision-Making, Performance Tuning
The Museum of Modern Art
Skills you'll gain: Liberal Arts, Culture, Student Engagement, Aesthetics, Social Sciences, Electronic Media, Creativity, Cultural Diversity, Media and Communications, Social Studies, Multimedia, Design, Journalism, Storytelling, Architectural Design, Design Elements And Principles, Environmental Issue, Artificial Intelligence, Research, Sociology
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Linux Commands, IBM Cognos Analytics, Data Pipelines, Apache Kafka, Bash (Scripting Language), Shell Script, Data Visualization, Dashboard, File Management, Star Schema, Unix Shell, IBM DB2, Business Intelligence, Databases, Stored Procedure, Relational Databases
Skills you'll gain: Business Intelligence, Data Modeling, Dashboard, Database Design, Extract, Transform, Load, Data Integration, Stakeholder Engagement, Data Warehousing, Databases, Data Presentation, Performance Tuning, Data Pipelines, Database Systems, Data Visualization Software, Business Reporting, Data Integrity, Business Analytics, Real Time Data, Requirements Elicitation, Scalability
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Virtual Private Networks (VPN), Data Security
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
University of Arizona
Skills you'll gain: Physical Science, Physics, General Science and Research, Science and Research, Scientific Methods, Scientific Visualization, Research, Simulations, Systems Of Measurement
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Cloud Storage, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Load Balancing, System Monitoring, Kubernetes, Network Performance Management, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Network Security, Cloud Storage, Cloud Applications, Cloud Services, Identity and Access Management, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Keras (Neural Network Library), Tensorflow, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Data Processing, Algorithms
University of Michigan
Skills you'll gain: Anatomy, Respiration, Kinesiology, Life Sciences, Vital Signs, Health Systems, Physical Therapy, Medical Terminology, Psychology, Clinical Experience, Structural Analysis, General Medicine
Skills you'll gain: Stakeholder Engagement, Software Development Life Cycle, Agile Software Development, Project Management Life Cycle, Resource Management, Risk Management, Peer Review, Earned Value Management, Stakeholder Management, Agile Methodology, Project Risk Management, Team Motivation, Kanban Principles, Project Schedules, Development Environment, Project Management Institute (PMI) Methodology, Information Technology, Sprint Retrospectives, Interviewing Skills, Project Management
In summary, here are 10 of our most popular vulnerability analysis and threat mitigation courses
- Structuring Machine Learning Projects: DeepLearning.AI
- Modern and Contemporary Art and Design: The Museum of Modern Art
- BI Foundations with SQL, ETL and Data Warehousing: IBM
- Google Business Intelligence: Google
- Security in Google Cloud: Google Cloud
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Astronomy: Exploring Time and Space: University of Arizona
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Preparing for Google Cloud Certification: Cloud Network Engineer: Google Cloud
- Convolutional Neural Networks: DeepLearning.AI