Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Malware Protection, Cryptography
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
University of California, Davis
Skills you'll gain: Search Engine Optimization, Persona Development, Web Analytics and SEO, Content Creation, Social Media Strategy, Competitive Analysis, Target Audience, Content Marketing, Peer Review, Social Media, Content Strategy, Google Analytics, Presentations, Forecasting, Digital Marketing, Expectation Management, User Research, Relationship Management, Marketing Strategy and Techniques, Web Content
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Manufacturing Operations, Forecasting, Process Improvement, Supplier Management, Operations Management, Purchasing, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Sales Management, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
Skills you'll gain: Project Management, Project Planning, Communication Planning, Project Documentation, Milestones (Project Management), Project Schedules, Risk Management, Cost Management, Budgeting, Estimation, Timelines, Procurement, Strategic Communication
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
University of Michigan
Skills you'll gain: Unified Modeling Language, Object Oriented Programming (OOP), JSON, Debugging, Object Oriented Design, Unit Testing, Program Development, Python Programming, Data Import/Export, Image Analysis, Jupyter, Maintainability, Data Structures, Software Engineering, Application Programming Interface (API), Computer Programming, File Management, Computer Vision, Computational Logic, Functional Design
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Unit Testing, Algorithms, Django (Web Framework)
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- Introduction to Cyber Attacks:Â New York University
- IBM Data Analyst:Â IBM
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Deep Learning:Â DeepLearning.AI
- Security in Google Cloud:Â Google Cloud
- The Bits and Bytes of Computer Networking:Â Google
- Search Engine Optimization (SEO):Â University of California, Davis
- Supply Chain Management:Â Rutgers the State University of New Jersey
- Project Planning: Putting It All Together:Â Google
- Foundations of Digital Marketing and E-commerce:Â Google