Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+identification+and+mitigation"
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Continuous Monitoring, Threat Detection, Email Security, Data Security, Security Management, IT Automation, System Monitoring, Real Time Data
LearnKartS
Skills you'll gain: Project Risk Management, Risk Management, Risk Mitigation, Contingency Planning, Risk Analysis, Stakeholder Engagement, Stakeholder Communications, Agile Project Management, Project Management, Plan Execution, Decision Making
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Skills you'll gain: Incident Response, Email Security, Cloud Security, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Malware Protection, Security Management, Information Systems Security, Network Security, Vulnerability Assessments, Cybersecurity, Incident Management, Threat Detection, Information Assurance, Intrusion Detection and Prevention, Cyber Security Policies, Security Information and Event Management (SIEM)
Skills you'll gain: Cloud Security, Incident Response, Computer Security Incident Management, Threat Management, Threat Detection, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Application Security, Web Applications, Malware Protection, Network Monitoring
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Security Management, Information Systems Security, Vulnerability Assessments, Information Assurance, Cybersecurity, Cyber Security Policies, Security Controls, Continuous Monitoring, Disaster Recovery, Technical Communication
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Security Management, Network Security, Cybersecurity, Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Security Controls, Distributed Denial-Of-Service (DDoS) Attacks, Digital Communications, Data Integrity
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Google Cloud Platform, Application Security, Vulnerability Management, Threat Management, Data Security, System Monitoring, Event Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Services
Skills you'll gain: Vulnerability Scanning, Threat Modeling, Vulnerability Management, Vulnerability Assessments, Secure Coding, Security Testing, Threat Management, Cyber Governance, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Application Security, Open Web Application Security Project (OWASP), Threat Detection, Cybersecurity, Risk Management Framework, Security Management, Security Controls, Code Review, Incident Response
In summary, here are 10 of our most popular threat+identification+and+mitigation courses
- Managing Threat Intelligence with Cortex XSOAR: Google Cloud
- Mitigating Security Vulnerabilities on Google Cloud en Français: Google Cloud
- Risk Response: LearnKartS
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- Certified Incident Handler (ECIH) v2: Packt
- Advanced Incident Handling and Analysis Techniques: Packt
- Information Assurance Analysis: Johns Hopkins University
- Foundations of Information Security and Incident Handling: Packt
- Handling Security Incidents Across Domains: Packt
- Security Fundamentals and Identity Management: Packt