Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+modeling+course"
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Natural Language Processing, Anomaly Detection, Vulnerability Management, Incident Management, Artificial Intelligence
University of Pennsylvania
Skills you'll gain: Risk Modeling, Probability Distribution, Mathematical Modeling, Risk Management, Data Visualization, Predictive Modeling, Data Modeling, Probability, Strategic Decision-Making, Simulation and Simulation Software, Forecasting, Data-Driven Decision-Making, Statistics, Microsoft Excel
LearnKartS
Skills you'll gain: Conflict Management, Project Management, Project Planning, Performance Analysis, Negotiation, Estimation, Project Coordination, Risk Management, Change Management, Stakeholder Management
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Microsoft Azure, Threat Management, Disaster Recovery, Security Strategy, Cybersecurity, Data Governance, Information Assurance, Personally Identifiable Information, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
The State University of New York
Skills you'll gain: Emergency Response, Crisis Intervention, Safety and Security, Public Affairs, Risk Management, Media and Communications, Community and Social Work, Vulnerability, Social Sciences, Persuasive Communication, Cultural Diversity, Diversity Awareness
Imperial College London
Skills you'll gain: Epidemiology, Mathematical Modeling, Statistical Modeling, Simulations, Infectious Diseases, R Programming, Network Model, Differential Equations, Statistical Methods, Quantitative Research, Applied Mathematics, Probability
In summary, here are 10 of our most popular threat+modeling+course courses
- Systems and Application Security: ISC2
- Advanced Cybersecurity Concepts and Capstone Project: Microsoft
- Cyber Threats and Attack Vectors: University of Colorado System
- Generative AI: Boost Your Cybersecurity Career : IBM
- Modeling Risk and Realities: University of Pennsylvania
- Models, Methods, and Artifacts: LearnKartS
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Database Essentials and Vulnerabilities: IBM
- Cybersecurity Management and Compliance: Microsoft
- Cyber Security in Manufacturing : University at Buffalo