Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Malware Protection, Cryptography
- Status: New
Skills you'll gain: Spring Framework, Cloud-Native Computing, Software Development Life Cycle, Hibernate (Java), Docker (Software), Git (Version Control System), GitHub, HTML and CSS, Object Oriented Programming (OOP), Spring Boot, Object-Relational Mapping, Development Environment, Web Design and Development, Object Oriented Design, Java Programming, Generative AI, Interviewing Skills, CI/CD, Java, Professional Networking
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
Columbia University
Skills you'll gain: Project Schedules, Construction Management, Construction Estimating, Project Finance, Cost Estimation, Bidding, Building Information Modeling, Scheduling, Cost Control, Environment Health And Safety, Risk Management, Project Closure, Lean Methodologies, Project Controls, Timelines, Real Estate, Cash Flows, Business Transformation, Innovation, Architecture and Construction
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- IBM Cybersecurity Analyst:Â IBM
- Creative Thinking: Techniques and Tools for Success:Â Imperial College London
- Cybersecurity for Everyone:Â University of Maryland, College Park
- Troubleshooting and Debugging Techniques:Â Google
- Introduction to Cyber Attacks:Â New York University
- IBM Java Developer:Â IBM
- Deep Learning:Â DeepLearning.AI
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Automated Cyber Security Incident Response:Â EDUCBA