Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Emergency Response, Safety and Security, Emergency Medicine, First Aid, Healthcare Ethics, Risk Analysis, Stress Management, Resourcefulness, Adaptability, Water Resources, Cultural Diversity, Activities of Daily Living (ADLs)
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, Network Performance Management, Computer Networking, Network Model, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
- Status: Free
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free
University of London
Skills you'll gain: Environmental Policy, International Relations, Energy and Utilities, Environment, Governance, Policy Analysis, Economics, Security Strategy, Electric Power Systems, Mitigation, Emerging Technologies, Stakeholder Engagement
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Disaster Preparedness:Â University of Pittsburgh
- Computer Communications:Â University of Colorado System
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Cybersecurity Awareness and Innovation:Â EIT Digital