Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+modeling"
University of Maryland, College Park
- Status: Free
University of California, Santa Cruz
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Leadership and Management, Security Strategy, Software Security
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Operating Systems
- Status: Free
Coursera Instructor Network
Kennesaw State University
Skills you'll gain: Leadership and Management, Risk Management, Security Strategy, Strategy, Strategy and Operations, System Security, Security Engineering, Computer Security Incident Management, Regulations and Compliance, Systems Design
Kennesaw State University
Skills you'll gain: Risk Management, Leadership and Management, System Security, Security Software, Software Security, Strategy, Computer Security Models, Cyberattacks, Network Security, Security Engineering
Infosec
New York University
Skills you'll gain: Computer Networking, Cyberattacks, Network Architecture, Network Security, Security Engineering, System Security, Security Strategy, Computer Security Models, Operational Analysis, Strategy
Stanford University
Skills you'll gain: Bayesian Network, Probability & Statistics, Probability Distribution, General Statistics, Graph Theory, Bayesian Statistics, Correlation And Dependence, Markov Model, Network Model, Decision Making
- Status: Free
Skills you'll gain: Computer Security Incident Management
Cisco Learning and Certifications
In summary, here are 10 of our most popular threat+modeling courses
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cyber-Physical Systems: Modeling and Simulation:Â University of California, Santa Cruz
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- NIST DoD RMF:Â Infosec
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Probabilistic Graphical Models 1: Representation:Â Stanford University