• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Identifying And Mitigating Usability Risks

Results for "identifying+and+mitigating+usability+risks"


  • I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    249 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, IT Security Architecture, Cloud Security, Cyber Risk, Intrusion Detection and Prevention, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Security Controls, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

  • L

    LearnKartS

    Information Security Risk Management

    Skills you'll gain: Risk Management, Risk Analysis, Risk Management Framework, Risk Modeling, Risk Appetite, Business Risk Management, Cyber Risk, Risk Mitigation, Threat Management, Enterprise Risk Management (ERM), Risk Control, Vulnerability Assessments, Vulnerability Management, Threat Detection, Security Controls, Stakeholder Communications, Vulnerability, Stakeholder Engagement

    Mixed · Course · 1 - 4 Weeks

  • P

    Packt

    CRISC: Certified in Risk and Information Systems Control

    Skills you'll gain: Cyber Security Assessment, Compliance Management, Internal Controls, Threat Detection, Governance, Continuous Monitoring, Data Management, Disaster Recovery, Key Performance Indicators (KPIs), Regulatory Requirements, Business Analysis, Organizational Structure, Accountability, Stakeholder Communications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    51 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Human-Centered Security: Designing Usable & Safe Systems

    Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy

    Intermediate · Course · 1 - 3 Months

  • G

    Google

    Play It Safe: Manage Security Risks

    Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    11K reviews

    Beginner · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • C

    Coursera

    Ethics and Safety in Open AI

    Skills you'll gain: Responsible AI, AI Security, Generative AI, Data Ethics, Threat Modeling, General Data Protection Regulation (GDPR), Model Evaluation, Metadata Management, Data Integrity, Data Validation

    Intermediate · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity Risk Management Frameworks

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

    4.7
    Rating, 4.7 out of 5 stars
    ·
    203 reviews

    Beginner · Specialization · 3 - 6 Months

  • C

    Coursera

    AI Model Risk Management

    Skills you'll gain: Governance Risk Management and Compliance, Compliance Management, Responsible AI, Risk Control, Risk Management, AI Security, Business Risk Management, Model Evaluation, Risk Mitigation, Governance, Compliance Auditing, Risk Analysis, Regulatory Requirements, Process Validation, Gap Analysis, Verification And Validation, Auditing, Key Performance Indicators (KPIs)

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on GC - Português

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management, Cloud Services

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Security-Driven Software Development

    Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)

    Intermediate · Course · 3 - 6 Months

  • I

    Infosec

    Access Control, Software Protection, System Integrity

    Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption

    Mixed · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular identifying+and+mitigating+usability+risks courses

  • Application Security for Developers and DevOps Professionals: IBM
  • Cybersecurity Prevention and Detection: Pearson
  • Information Security Risk Management: LearnKartS
  • CRISC: Certified in Risk and Information Systems Control: Packt
  • Human-Centered Security: Designing Usable & Safe Systems: Packt
  • Play It Safe: Manage Security Risks: Google
  • Ethics and Safety in Open AI: Coursera
  • Cybersecurity Risk Management Frameworks: Kennesaw State University
  • AI Model Risk Management: Coursera
  • Mitigating Security Vulnerabilities on GC - Português: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok