Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat assessment"
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Information Systems Security Assessment Framework (ISSAF), Security Strategy, Security Awareness, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Personally Identifiable Information
- Status: New
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Emergency Response, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Health Assessment
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Active Listening, Problem Solving, Collaboration, Presentations, Interpersonal Communications, Teamwork, Conflict Management, Creative Problem-Solving, Constructive Feedback, Creative Thinking, Root Cause Analysis, Team Building, Virtual Teams, Team Oriented, Public Speaking, Agile Methodology, Persuasive Communication, Client Services, Ability To Meet Deadlines, Business Research
- Status: Free
Commonwealth Education Trust
Skills you'll gain: Pedagogy, Teaching, Education and Training, Student-Centred Learning, Student Engagement, Instructional and Curriculum Design, Peer Review, Curriculum Development, Report Writing, Descriptive Statistics
- Status: Free
Knowledge Accelerators
Skills you'll gain: Power BI, Dashboard, Data Presentation, Data Visualization Software, Interactive Data Visualization, Data Import/Export, Business Intelligence, Microsoft Excel, Data Analysis, Data-Driven Decision-Making, Data Sharing, Data Modeling
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Security Controls, Vulnerability Assessments, Vulnerability Management, Incident Response, Network Architecture
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
- Status: Free
University of Pennsylvania
Skills you'll gain: Vital Signs, Respiration, Health Assessment, Anatomy, Health Care, Patient Treatment
In summary, here are 10 of our most popular threat assessment courses
- Foundations of Cybersecurity:Â Google
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Assets, Threats, and Vulnerabilities:Â Google
- Psychological First Aid:Â Johns Hopkins University
- Foundations: Data, Data, Everywhere:Â Google
- People and Soft Skills for Professional and Personal Success:Â IBM
- Foundations of Teaching for Learning: Introduction to Student Assessment:Â Commonwealth Education Trust
- From Excel to Power BI:Â Knowledge Accelerators
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Cybersecurity Assessment: CompTIA Security+ & CYSA+:Â IBM