Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Network Security, Private Cloud, Threat Detection, Firewall, Security Management, Cyber Security Policies, Identity and Access Management
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Cyber Security Assessment, Security Management, NIST 800-53, Cyber Governance, Cybersecurity, Cyber Security Strategy, Cyber Risk, Configuration Management
Rutgers the State University of New Jersey
Skills you'll gain: Supplier Quality Management, Procurement, Strategic Sourcing, Enterprise Resource Planning, Purchasing, Environmental Social And Corporate Governance (ESG), Strategic Partnership, Business Risk Management, Key Performance Indicators (KPIs), Supplier Relationship Management, Supply Chain, Risk Management, Derivatives, Organizational Structure, Consolidation, Target Audience, Talent Management, Robotic Process Automation, Supply Chain Management, Risk Mitigation
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Scripting, Vulnerability Assessments, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Data Ethics, Email Security, Computer Security Awareness Training, Malware Protection
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Environment, Environmental Science, Environmental Issue, Corporate Sustainability, Pollution Prevention, Energy and Utilities, Mitigation, Environmental Policy, Environmental Engineering, Education and Training
- Status: New
Skills you'll gain: Security Management, Incident Management, Threat Management, Compliance Management, Regulatory Compliance, Risk Management, Security Strategy, Cybersecurity, Cyber Security Policies, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Governance, Security Awareness, Disaster Recovery, Business Continuity, Organizational Strategy
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Security Strategy, Intrusion Detection and Prevention, Data Security, Security Controls
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Network Monitoring
Alberta Machine Intelligence Institute
Skills you'll gain: Feature Engineering, Data Quality, Data Processing, Supervised Learning, Data Validation, Data Cleansing, Data Transformation, Verification And Validation, Applied Machine Learning, Machine Learning, Unsupervised Learning, Machine Learning Algorithms, Exploratory Data Analysis
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Cybersecurity Policy for Water and Electricity Infrastructures:Â University of Colorado System
- Advanced Global Procurement and Sourcing:Â Rutgers the State University of New Jersey
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- The Total Data Quality Framework:Â University of Michigan
- Introduction to Carbon Reduction and Net Zero:Â Coursera Instructor Network
- Certified Information Security Manager (CISM):Â Packt
- Seguridad en la red:Â Universidad de los Andes
- In the Trenches: Security Operations Center :Â EC-Council