Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
University of Illinois Urbana-Champaign
Skills you'll gain: Risk Management, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Operational Risk, Data Visualization, Tableau Software, Cybersecurity, Data-Driven Decision-Making, Dashboard, Diversity Equity and Inclusion Initiatives, Persuasive Communication, Communication, Algorithms
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: New
Coursera Project Network
Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, TCP/IP, Web Servers, Network Security
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Linux, Scenario Testing, Security Testing, Linux Commands, Command-Line Interface, Microsoft Windows, Cryptography, Virtual Machines
Duke University
Skills you'll gain: Environmental Issue, Environment, Physical Science, Energy and Utilities, Environmental Science, International Relations, Pollution Prevention, Environmental Policy, Mitigation, Trend Analysis, Simulations
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Enterprise Security, Cyber Operations, Information Technology Operations, Automation, Systems Integration
- Status: Free
University of Washington
Skills you'll gain: Social Justice, Community Organizing, Social Sciences, Cultural Diversity, Public Policies, World History, Political Sciences, Advocacy, Governance, Media and Communications
Skills you'll gain: Penetration Testing, Network Protocols, Network Monitoring, Network Security, Network Analysis, Cyber Operations, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Security Testing, System Configuration, Image Analysis, File Management, Open Source Technology, Virtualization, Virtual Machines, Software Installation, Microsoft Windows
Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Management, Network Security, Internet Of Things, Threat Detection, Cloud Security, Security Engineering, Infrastructure Security, Vulnerability Management, Identity and Access Management, Encryption, Information Systems Security, Incident Response, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security
LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Threat Detection, Cyber Security Assessment, Cybersecurity, Security Software, Telecommuting, Cyber Risk, Cyber Security Strategy, Security Awareness, Security Controls, Virtual Private Networks (VPN), Risk Management Framework
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: DevSecOps, Cloud Security, Threat Modeling, Cloud-Native Computing, Threat Management, Application Deployment, Cyber Threat Intelligence, Serverless Computing, Cloud Computing, Containerization, Amazon Web Services, Application Programming Interface (API), Cyber Security Policies
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), Application Security, Linux Commands, User Accounts, Network Monitoring, System Monitoring, Hardening, Security Controls, Wireless Networks, Cyber Security Assessment, Penetration Testing, Threat Detection, Containerization, File Management, Incident Response
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Empathy and Data in Risk Management:Â University of Illinois Urbana-Champaign
- Automating Response to Phishing with Cortex XSOAR:Â Google Cloud
- Wireshark for Packet Capture: Analyze web traffic:Â Coursera Project Network
- The Complete Pentesting and Privilege Escalation Course:Â Packt
- Climate Science for Everyone:Â Duke University
- SOAR for Enterprise Security:Â Codio
- Ukraine: History of Civil Society:Â University of Washington
- Digital Forensics for Pentesters - Hands-On Learning:Â Packt
- Assessing and Managing Secure IoT Applications and Devices:Â LearnQuest
- Fundamentals of Remote Team Security:Â LearnQuest