Filter by
The language used throughout the course, in both instruction and assessments.
Explore the Counterterrorism Course Catalog
Skills you'll gain: Personally Identifiable Information, Information Technology Architecture, General Data Protection Regulation (GDPR), Information Privacy, Information Technology, Security Controls, Computer Security Awareness Training, Data Security, Emerging Technologies, Risk Management Framework, Systems Development Life Cycle, Enterprise Security, Disaster Recovery, Cloud Computing, Encryption, Authorization (Computing), Authentications, Artificial Intelligence
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
Packt
Skills you'll gain: Disaster Recovery, Incident Management, Business Continuity Planning, Information Technology Operations, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Patch Management, Threat Detection, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Management, Safety and Security, Configuration Management, Change Control
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Attacks, Security Management, Cybersecurity, Risk Management, Cyber Security Assessment, Incident Management, Risk Analysis, Cyber Governance, Threat Management, Secure Coding, Malware Protection, Cyber Risk, Governance, Security Strategy, Enterprise Risk Management (ERM), Intrusion Detection and Prevention, Cyber Threat Intelligence, Governance Risk Management and Compliance
Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Security Management, Security Information and Event Management (SIEM), Infrastructure Security, Network Analysis
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Intelligence Collection and Analysis, Survey Creation, Environment, Qualitative Research, Sampling (Statistics), R Programming, Environmental Issue, Political Sciences, Economic Development, International Relations, Cybersecurity, Public Safety and National Security, Socioeconomics, Governance, Mitigation, Social Studies, Social Sciences, Security Strategy, Conflict Management
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
Skills you'll gain: Continuous Monitoring, NIST 800-53, Security Controls, Risk Management Framework, Authorization (Computing), Security Strategy, Security Management, Configuration Management, Cyber Risk, Change Control, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Cyber Security Assessment, Vulnerability Assessments
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Information Technology and Security Principles: Packt
- Advanced Cybersecurity Topics: Johns Hopkins University
- Security Operations: Packt
- Advanced Techniques for Implementing Security Services: LearnQuest
- Cybersecurity Fundamentals: Johns Hopkins University
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Incident Response, Risk Management, and Compliance: Packt
- Security Operations: Packt
- Security Foundations, Threats, and Network Protection: Packt
- M.A. in International Relations, Security, and Strategy: O.P. Jindal Global University