Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, TCP/IP, Python Programming, Data Access, User Accounts, System Programming, Automation
- Status: New
Board Infinity
Skills you'll gain: Prompt Engineering, Generative AI, ChatGPT, OpenAI, Data Ethics, Content Creation, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Computer Programming, Automation, Emerging Technologies
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Incident Response, Query Languages, Interactive Data Visualization
Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Secure Coding, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Web Applications, Cloud Development, Security Controls, Data Loss Prevention, Firewall, Relational Databases, Key Management, Threat Detection, Authentications, Encryption
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: New
Skills you'll gain: Cybersecurity, Cyber Attacks, General Networking, Network Security, Network Routing, Threat Detection, Infrastructure Security, Endpoint Security, Routing Protocols, Information Systems Security, Firewall, Incident Response, Computer Networking, Cloud Security, Wireless Networks, Information Technology Infrastructure Library
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Wireless Networks
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Continuous Monitoring, Encryption, Information Privacy
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Threat Modeling, Security Awareness, Social Sciences, Culture, Investigation, Psychology, Survey Creation, Research
- Status: Free
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Application Deployment, Application Development, Large Language Modeling, Data Ethics, Artificial Intelligence, Generative AI, Human Machine Interfaces, Scalability, Application Security, Information Privacy
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Personal Development, Self-Awareness, De-escalation Techniques, Stress Management, Health Technology
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Generative AI: Prompt Engineering Basics:Â Board Infinity
- Manage Security Operations:Â Microsoft
- Secure your Cloud Data:Â Microsoft
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Palo Alto Networks Cybersecurity Fundamentals:Â Packt
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- Cybercrime:Â Royal Holloway, University of London