Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Counterterrorism Course Catalog
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, World History, International Relations, Political Sciences, Public Policies, Trend Analysis, Psychology
Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Cyber Security Strategy, Security Awareness, Security Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Authentications, Infrastructure Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, General Networking, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Surveys, Intelligence Collection and Analysis, Risk Mitigation, Environmental Laws, Environment, Qualitative Research, Sampling (Statistics), R Programming, Political Sciences, Economic Development, International Relations, Cybersecurity, Socioeconomics, Governance, Public Safety and National Security, Mitigation, Ancient History, Social Sciences, Security Strategy
- Status: NewStatus: Free Trial
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Data Security, Linux, System Monitoring
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Security Management, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Disaster Recovery, Malware Protection
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Security Awareness, Cryptographic Protocols, Data Security, Advanced Encryption Standard (AES), Secure Coding, Hardening, Data Encryption Standard, Firewall, Technical Support and Services, Information Technology, Cyber Security Strategy
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: Free Trial
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Continuous Monitoring, NIST 800-53, Security Management, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Terrorism and Counterterrorism: Comparing Theory and Practice:Â Universiteit Leiden
- International Security Management:Â Erasmus University Rotterdam
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Cybersecurity Awareness for Everyone:Â Kennesaw State University
- Managing Cybersecurity:Â Kennesaw State University
- M.A. in International Relations, Security, and Strategy:Â O.P. Jindal Global University
- Security: A Comprehensive Approach:Â Illinois Tech
- Cyber Incident Response:Â Infosec
- Cybersecurity Fundamentals:Â IBM
- AI for Cybersecurity:Â Johns Hopkins University