Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
University of Pennsylvania
Skills you'll gain: Risk Modeling, Financial Statements, Probability Distribution, Mathematical Modeling, Statistical Modeling, Portfolio Management, Regression Analysis, Business Modeling, Financial Modeling, Strategic Decision-Making, Data Presentation, Risk Management, Decision Making, Data Visualization, Microsoft PowerPoint, Predictive Modeling, Investment Management, Spreadsheet Software, Google Sheets, Excel Formulas
Skills you'll gain:
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
- Status: New
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis, Scikit Learn (Machine Learning Library)
- Status: New
Skills you'll gain: Spring Framework, Cloud-Native Computing, Software Development Life Cycle, Hibernate (Java), Docker (Software), Git (Version Control System), GitHub, HTML and CSS, Object Oriented Programming (OOP), Spring Boot, Object-Relational Mapping, Development Environment, Web Design and Development, Object Oriented Design, Java Programming, Generative AI, Interviewing Skills, CI/CD, Java, Professional Networking
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
Duke University
Skills you'll gain: Data Storytelling, Database Design, Dashboard, MySQL, Relational Databases, SQL, Tableau Software, Business Analytics, Business Metrics, Data Visualization Software, Data Visualization, Business Process Improvement, Business Intelligence, Financial Modeling, Interactive Data Visualization, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- Creative Thinking: Techniques and Tools for Success:Â Imperial College London
- Business and Financial Modeling:Â University of Pennsylvania
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Troubleshooting and Debugging Techniques:Â Google
- International Cyber Conflicts:Â The State University of New York
- IBM Cybersecurity Analyst:Â IBM
- Certified in Cybersecurity:Â ISC2
- IBM Generative AI Engineering:Â IBM
- IBM Java Developer:Â IBM
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft