Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Project Management, Project Management Life Cycle, Project Coordination, Work Breakdown Structure, Project Planning, Artificial Intelligence, IBM Cloud, Project Documentation, Artificial Intelligence and Machine Learning (AI/ML), Operational Efficiency, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Business Ethics, Automation, Image Analysis, Technical Communication
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Skills you'll gain: ChatGPT, Generative AI, Commercialization, Product Management, Product Lifecycle Management, Stakeholder Communications, OpenAI, Technical Product Management, Artificial Intelligence, Team Building, Product Roadmaps, Return On Investment, Product Development, New Product Development, Product Strategy, IBM Cloud, Technical Communication, Artificial Intelligence and Machine Learning (AI/ML), Software Development Tools, Image Analysis
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
DeepLearning.AI
Skills you'll gain: Supervised Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Data-Driven Decision-Making
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: New
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Data Presentation, Risk Analysis, Project Scoping, Process Mapping, Process Optimization, Data Visualization, Requirements Management, Risk Management, Interactive Data Visualization, Business Requirements, Stakeholder Management, Stakeholder Engagement, Excel Formulas, Microsoft Excel, Analysis
Skills you'll gain: Site Reliability Engineering, Kubernetes, Application Performance Management, Google Cloud Platform, Cloud Infrastructure, System Monitoring, Application Deployment, Identity and Access Management, Containerization, CI/CD, Cloud Storage, Cloud Security, Cloud Applications, Cloud Services, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
Michigan State University
Skills you'll gain: Peer Review, Content Creation, Aesthetics, Electronic Media, Storytelling, Creativity, Liberal Arts, Web Design and Development
Arizona State University
Skills you'll gain: Lesson Planning, Peer Review, Teaching, Pedagogy, Curriculum Planning, Instructing, Learning Strategies, Instructional Strategies, Motivational Skills, Educational Materials, Learning Styles, Language Learning, Performance Review, Vocabulary, Design Elements And Principles, Learning Theory, Design Strategies, Lifelong Learning, Grammar, Public Speaking
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- Generative AI for Project Managers:Â IBM
- Connect and Protect: Networks and Network Security:Â Google
- Play It Safe: Manage Security Risks:Â Google
- Generative AI for Product Managers:Â IBM
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Supervised Machine Learning: Regression and Classification :Â DeepLearning.AI
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Data Science: Foundations using R:Â Johns Hopkins University
- IBM Business Analyst:Â IBM
- Preparing for Google Cloud Certification: Cloud DevOps Engineer:Â Google Cloud