Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
Johns Hopkins University
Skills you'll gain: Patient Safety, Corrective and Preventive Action (CAPA), Case Management, Safety Assurance, Continuous Quality Improvement (CQI), Persuasive Communication
- Status: New
Johns Hopkins University
Skills you'll gain: Stakeholder Engagement, Stakeholder Management, Project Management, Project Risk Management, Data Ethics, Workforce Management, Risk Mitigation, Human Resources Management and Planning, Project Management Life Cycle, Agile Methodology, Artificial Intelligence, Team Management, Risk Management, Talent Management, Team Building, Scalability, Performance Appraisal, Diversity Training, Budget Management, Business Ethics
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
EDHEC Business School
Skills you'll gain: Environmental Issue, Energy and Utilities, Mitigation, Engineering, Systems Of Measurement, Environment, Mathematical Modeling, Environmental Engineering, Environmental Science, Scientific Methods, Physics, Trend Analysis
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Infrastructure Security, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Security Testing, Virtual Private Networks (VPN)
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cybersecurity, IT Management, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure
- Status: New
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Duke University
Skills you'll gain: Large Language Modeling, Prompt Engineering, Microsoft Azure, OpenAI, Risk Management Framework, MLOps (Machine Learning Operations), Software Architecture, Generative AI, Application Deployment, Artificial Intelligence, GitHub, Application Programming Interface (API), Scalability
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models
- Status: New
FAIR Institute
Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Legal Risk, Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Risk Management, Safety Culture, Financial Regulations, Compliance Reporting, Regulatory Requirements
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Taking Safety and Quality Improvement Work to the Next Level (Patient Safety VII):Â Johns Hopkins University
- Managing AI Projects: From Strategy to Delivery:Â Johns Hopkins University
- Blockchain Security:Â Infosec
- Science and Engineering of Climate Change:Â EDHEC Business School
- Cybersecurity Architecture:Â IBM
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Advanced Cybersecurity Risk Management:Â Board Infinity
- Operationalizing LLMs on Azure:Â Duke University
- Web Connectivity and Security in Embedded Systems:Â EIT Digital