Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat modeling"
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Cyber Security Policies, Threat Modeling, Cyber Risk, Audit Planning, Compliance Management, Cyber Security Assessment, Enterprise Security, Cybersecurity, ISO/IEC 27001, Auditing, Change Management, Governance, Vulnerability Assessments, NIST 800-53, Risk Management, Risk Mitigation, Regulation and Legal Compliance, Policy Analysis
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
- Status: Free Trial
Skills you'll gain: Time Series Analysis and Forecasting, SAS (Software), Forecasting, Regression Analysis, Applied Machine Learning, Statistical Analysis, Advanced Analytics, Statistical Methods, Predictive Modeling, Statistical Modeling, Bayesian Statistics, Artificial Neural Networks
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, OpenAI, ChatGPT, Security Strategy, Risk Mitigation
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, Risk Management, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
- Status: NewStatus: Free Trial
University of Michigan
Skills you'll gain: Data Analysis, Python Programming, Jupyter
In summary, here are 10 of our most popular threat modeling courses
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Play It Safe: Manage Security Risks:Â Google
- Introduction to Cyber Attacks:Â New York University
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Certified Kubernetes Security Specialist (CKS): Unit 1:Â Pearson
- Designing Robust Information System Security Architectures:Â LearnQuest
- Cyber Security: GRC Part 1 - Governance:Â Macquarie University
- Risk Management and Incident Response:Â Packt
- Modeling Time Series and Sequential Data:Â SAS
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network