Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat mitigation"
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Computer Security, Security Controls, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Identity and Access Management
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN)
- Status: New
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Data Presentation, Risk Analysis, Project Scoping, Process Mapping, Process Optimization, Data Visualization, Requirements Management, Risk Management, Interactive Data Visualization, Business Requirements, Stakeholder Management, Stakeholder Engagement, Excel Formulas, Microsoft Excel, Analysis
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
New York Institute of Finance
Skills you'll gain: Credit Risk, Operational Risk, Risk Management, Risk Management Framework, Business Risk Management, Risk Modeling, Risk Appetite, Risk Mitigation, Financial Market, Enterprise Risk Management (ERM), Risk Control, Derivatives, Governance, Portfolio Management, Risk Analysis, Capital Markets, Investment Management, Financial Analysis, Market Data, Key Performance Indicators (KPIs)
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Cybersecurity, System Monitoring, Threat Detection, Multi-Factor Authentication, Encryption
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: New
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Data Ethics, Artificial Intelligence, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication, Information Privacy, Natural Language Processing, Diversity Equity and Inclusion Initiatives, Mitigation
In summary, here are 10 of our most popular threat mitigation courses
- Assets, Threats, and Vulnerabilities:Â Google
- IT Security: Defense against the digital dark arts :Â Google
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Security in Google Cloud:Â Google Cloud
- IBM Business Analyst:Â IBM
- Python for Cybersecurity:Â Infosec
- Play It Safe: Manage Security Risks:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- Risk Management:Â New York Institute of Finance
- Microsoft SC-900 Exam Preparation and Practice:Â Microsoft