Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Microsoft SQL Servers, Data Encryption Standard, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Threat Modeling, Identity and Access Management, Firewall
- Status: New
Skills you'll gain: AI Personalization, Generative AI, Education Software and Technology, ChatGPT, Data Ethics, Prompt Engineering, Artificial Intelligence, Ethical Standards And Conduct, Information Privacy, Diversity Awareness, Data Security
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Network Security, Scenario Testing, Malware Protection, Encryption, Test Case
University of Toronto
Skills you'll gain: Diversity Awareness, Diversity and Inclusion, Innovation, Analysis, Design Thinking, Sociology, Market Opportunities, Social Justice, Data Ethics, Risk Mitigation
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
- Status: New
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, Cyber Attacks, MITRE ATT&CK Framework, Cyber Threat Hunting, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Encryption
Skills you'll gain: Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, TCP/IP, Mobile Security, Information Systems Security, Linux, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Threat Detection, Test Tools
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- A General Approach to Risk Management: Kennesaw State University
- Secure Your Data at Rest: Microsoft
- Generative AI: Empowering Modern Education: IBM
- CEH (v12) Practice Projects and Exam Simulators: LearnKartS
- Gender Analytics for Innovation: University of Toronto
- Personnel & Third-Party Security: University of California, Irvine
- Certified Ethical Hacker (CEH) v.12: Packt
- CompTIA A+ Certification Core 2 (220-1102): Packt
- Introduction to Network Security: University of London
- NIST 800-171: Infosec