Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat assessment"
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cybersecurity, Network Protocols, Vulnerability Assessments, Network Architecture, Event Monitoring, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Banco Interamericano de Desarrollo
Skills you'll gain: Failure Analysis, Risk Analysis, Risk Modeling, Feasibility Studies, Risk Management, Project Risk Management, Risk Mitigation, Business Risk Management, Enterprise Risk Management (ERM), Analysis, Mitigation, Governance, Disaster Recovery, Financial Analysis, Cost Benefit Analysis, Environmental Resource Management, Civil Engineering, Data Analysis Software, Quantitative Research, Simulation and Simulation Software
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Cyber Governance
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Emergency Response, Trauma Care, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Health Assessment
University of Michigan
Skills you'll gain: Product Lifecycle Management, Product Development, Product Design, Environment and Resource Management, Environment, Corporate Sustainability, Simulation and Simulation Software, Analysis, Research Reports, Data Analysis Software, Data Collection
In summary, here are 10 of our most popular threat assessment courses
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Google Cybersecurity:Â Google
- IBM Cybersecurity Analyst:Â IBM
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Security Analyst Fundamentals:Â IBM
- Natural Disaster and Climate Change Risk Assessment:Â Banco Interamericano de Desarrollo
- IT Fundamentals for Cybersecurity:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University