Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+identification+and+mitigation"
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Application Security, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Information Assurance, Program Standards, Computer Security
- Status: Free
Coursera Instructor Network
Skills you'll gain: Data Ethics, Generative AI, Regulatory Compliance, Security Strategy, Healthcare Industry Knowledge, Artificial Intelligence, Health Care, System Implementation, Personally Identifiable Information, Data Security, Technology Solutions
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Security Management, Security Information and Event Management (SIEM), Infrastructure Security, Network Analysis
Juniper Networks
Skills you'll gain: Intrusion Detection and Prevention, Juniper Network Technologies, Network Security, Firewall, Security Software, Threat Management, Network Administration, Proxy Servers, Cloud Security, Email Security, TCP/IP, Malware Protection, Threat Detection, User Accounts, System Configuration, Content Management
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Cloud Security, Threat Detection, Application Security, Continuous Monitoring, Cybersecurity, Security Controls, Data Security, Personally Identifiable Information, Identity and Access Management, Cloud Services, Automation
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Risk Analysis, Vulnerability Management, Business Continuity, Cyber Security Assessment, Business Risk Management, Risk Mitigation, Risk Management, Incident Response, Security Management, Business Analysis
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
In summary, here are 10 of our most popular threat+identification+and+mitigation courses
- Identifying and Managing Security Gaps for Remote Teams: LearnQuest
- Security Governance & Compliance: University of California, Irvine
- GenAI for Telemedicine Data Security: Coursera Instructor Network
- Intrusion Detection: Johns Hopkins University
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Security Operations: Packt
- Security Features and Advanced Threat Prevention : Juniper Networks
- Cyber Attack Countermeasures: New York University
- Mitigating Security Vulnerabilities on GC - Português: Google Cloud
- Security Foundations, Threats, and Network Protection: Packt