• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Coursera Plus
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Cyber Threat Mitigation
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "cyber threat mitigation"

    • I

      IBM

      Incident Response and Digital Forensics

      Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity, Technical Communication

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.9K reviews

      Intermediate · Course · 1 - 4 Weeks

    • D

      Duke University

      Decentralized Finance (DeFi): The Future of Finance

      Skills you'll gain: Blockchain, Loans, FinTech, Lending and Underwriting, Cyber Risk, Operational Risk, Scalability, Security Testing, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, General Lending, Risk Management, Derivatives, Key Management, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets

      4.8
      Rating, 4.8 out of 5 stars
      ·
      1.9K reviews

      Intermediate · Specialization · 3 - 6 Months

    • I

      Infosec

      Cyber Incident Response

      Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery

      4.7
      Rating, 4.7 out of 5 stars
      ·
      164 reviews

      Beginner · Course · 1 - 4 Weeks

    • I

      IBM

      Generative AI: Boost Your Cybersecurity Career

      Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence

      4.7
      Rating, 4.7 out of 5 stars
      ·
      95 reviews

      Intermediate · Course · 1 - 4 Weeks

    • U

      University of Colorado System

      Homeland Security and Cybersecurity

      Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Continuous Monitoring, NIST 800-53, Security Management, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

      4.7
      Rating, 4.7 out of 5 stars
      ·
      622 reviews

      Beginner · Specialization · 3 - 6 Months

    • I

      Infosec

      Python for Cybersecurity

      Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention

      4.5
      Rating, 4.5 out of 5 stars
      ·
      499 reviews

      Intermediate · Specialization · 3 - 6 Months

    • I

      ISC2

      Security Principles

      Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Security Awareness, Cyber Governance, Security Management, Cyber Risk, Security Strategy, Personally Identifiable Information, Data Ethics, Data Integrity

      4.7
      Rating, 4.7 out of 5 stars
      ·
      543 reviews

      Beginner · Course · 1 - 3 Months

    • D

      DeepLearning.AI

      AI for Good

      Skills you'll gain: Disaster Recovery, Data Analysis, Jupyter, Exploratory Data Analysis, Data Ethics, Image Analysis, Emergency Response, Artificial Intelligence, Machine Learning, Predictive Modeling, Applied Machine Learning, Mitigation, Text Mining, Environmental Monitoring, Natural Language Processing, Unstructured Data, Information Privacy, Deep Learning, Data Processing, Forecasting

      4.7
      Rating, 4.7 out of 5 stars
      ·
      459 reviews

      Beginner · Specialization · 1 - 3 Months

    • J

      Johns Hopkins University

      AI for Cybersecurity

      Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software

      4.5
      Rating, 4.5 out of 5 stars
      ·
      33 reviews

      Intermediate · Specialization · 3 - 6 Months

    • G

      Google

      Automate Cybersecurity Tasks with Python

      Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Integrated Development Environments, File Management, Data Structures

      4.8
      Rating, 4.8 out of 5 stars
      ·
      3K reviews

      Beginner · Course · 1 - 4 Weeks

    • U

      University of California, Irvine

      Introduction to Cybersecurity & Risk Management

      Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Regulatory Compliance, Cyber Security Policies, Supplier Management, Security Awareness, Cyber Security Strategy

      4.7
      Rating, 4.7 out of 5 stars
      ·
      292 reviews

      Beginner · Specialization · 1 - 3 Months

    • U

      University of Colorado System

      Computer Security and Systems Management

      Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security

      4.6
      Rating, 4.6 out of 5 stars
      ·
      1.9K reviews

      Beginner · Specialization · 3 - 6 Months

    Searches related to cyber threat mitigation

    real-time cyber threat detection and mitigation
    1…567…66

    In summary, here are 10 of our most popular cyber threat mitigation courses

    • Incident Response and Digital Forensics: IBM
    • Decentralized Finance (DeFi): The Future of Finance: Duke University
    • Cyber Incident Response: Infosec
    • Generative AI: Boost Your Cybersecurity Career : IBM
    • Homeland Security and Cybersecurity: University of Colorado System
    • Python for Cybersecurity: Infosec
    • Security Principles: ISC2
    • AI for Good: DeepLearning.AI
    • AI for Cybersecurity: Johns Hopkins University
    • Automate Cybersecurity Tasks with Python: Google

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok