Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Vulnerability Assessments, Network Architecture, Event Monitoring, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Cyber Governance
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: AI skills
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
- Status: New
Skills you'll gain: Spring Framework, Cloud-Native Computing, Software Development Life Cycle, Hibernate (Java), Docker (Software), Git (Version Control System), GitHub, HTML and CSS, Object Oriented Programming (OOP), Spring Boot, Object-Relational Mapping, Development Environment, Web Design and Development, Object Oriented Design, Java Programming, Generative AI, Interviewing Skills, CI/CD, Java, Professional Networking
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Ideation, Verification And Validation, Document Management, Artificial Intelligence and Machine Learning (AI/ML), OpenAI, Creative Thinking, Artificial Intelligence, Creativity, Personalized Service, Risk Management Framework, Business Process Automation, Expense Management, Automation, Strategic Thinking, Productivity Software, Microsoft Excel, Python Programming, Business Intelligence
Vanderbilt University
Skills you'll gain: ChatGPT, Creative Problem-Solving, Generative AI, Image Analysis, Data Capture, Artificial Intelligence, Innovation, OpenAI, Data Analysis, Organizational Skills, Teaching, Interactive Learning, Instructional Strategies, Lesson Planning, Computer Vision, Creative Thinking, Student Engagement, Creativity, Curriculum Planning, Natural Language Processing
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- Introduction to Cyber Security:Â New York University
- Google Cybersecurity:Â Google
- Microsoft Cybersecurity Analyst:Â Microsoft
- IT Fundamentals for Cybersecurity:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Microsoft Power BI Data Analyst:Â Microsoft
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Security Analyst Fundamentals:Â IBM
- IBM Java Developer:Â IBM
- Cyber Incident Response:Â Infosec