Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation"
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Cyber Security Strategy, Security Awareness, Security Management
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Security Awareness, Threat Management, Malware Protection, Vulnerability Management, Artificial Intelligence
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Crisis Management, Operational Risk, Risk Management, Event Monitoring, System Monitoring, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Technical Support, Networking Hardware, Application Development, Computer Hardware, Information Technology, Cloud Computing, Databases
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Regulatory Compliance, Cyber Security Policies, Supplier Management, Security Awareness, Cyber Security Strategy
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance
- Status: Free
The University of Chicago
Skills you'll gain: Mitigation, Environment, Physics, Mathematical Modeling, Environmental Monitoring, Systems Thinking, Environmental Science, Simulations, Biology, Economics, Energy and Utilities, Chemistry, Data Collection
DeepLearning.AI
Skills you'll gain: Disaster Recovery, Data Analysis, Jupyter, Exploratory Data Analysis, Data Ethics, Image Analysis, Emergency Response, Artificial Intelligence, Machine Learning, Predictive Modeling, Applied Machine Learning, Mitigation, Text Mining, Environmental Monitoring, Natural Language Processing, Unstructured Data, Information Privacy, Deep Learning, Data Processing, Forecasting
Searches related to cyber threat mitigation
In summary, here are 10 of our most popular cyber threat mitigation courses
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Cybersecurity Case Studies and Capstone Project:Â IBM
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- NIST Cybersecurity and Risk Management Frameworks:Â Packt
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- Introduction to Cybersecurity & Risk Management:Â University of California, Irvine
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Cybersecurity and the X-Factor:Â Kennesaw State University