• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Threat Identification And Mitigation

Results for "threat+identification+and+mitigation"


  • Status: New
    New
    S

    SkillUp

    Customer Identification Program - US

    Skills you'll gain: Compliance Training, Regulatory Compliance, Financial Regulation, Personally Identifiable Information, Workflow Management, Fraud detection, Financial Controls, Standard Operating Procedure, Event Monitoring, Data Validation, Financial Systems, Data Collection, Finance

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Malware Protection, Cyber Attacks, Risk Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    6 reviews

    Beginner · Specialization · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    S

    SkillUp

    Name Screening and Reporting Obligations - US

    Skills you'll gain: Bank Regulations, Financial Regulation, Legal Risk, Law, Regulation, and Compliance, Compliance Auditing, Regulatory Compliance, Regulation and Legal Compliance, Regulatory Requirements, Auditing, Compliance Reporting, Compliance Management, Compliance Training, Due Diligence, Verification And Validation, Incident Response, Asset Protection, Continuous Monitoring, Investigation

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Governance, Risk & Compliance

    Skills you'll gain: Cyber Security Strategy, Incident Response, Cyber Governance, Incident Management, Security Strategy, Computer Security Incident Management, Risk Modeling, Risk Analysis, Cyber Security Policies, Governance Risk Management and Compliance, Cyber Threat Intelligence, Event Monitoring, Cyber Risk, Cybersecurity, Cyber Security Assessment, Governance, Compliance Management, Cyber Operations, Risk Management, Risk Control

    4.6
    Rating, 4.6 out of 5 stars
    ·
    19 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

What brings you to Coursera today?

  • I

    ISC2

    Risk Identification, Monitoring, and Analysis

    Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Vulnerability Scanning, Risk Management Framework, Operational Risk, Threat Management, Cyber Security Assessment, Intrusion Detection and Prevention, Cyber Risk, Computer Security Incident Management, Vulnerability Management, Risk Modeling, Security Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Event Monitoring, Network Monitoring, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    31 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data & Identity Security

    Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness

    4.4
    Rating, 4.4 out of 5 stars
    ·
    11 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    J

    John Wiley & Sons

    Cybersecurity Threats and Security Program Development

    Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Security Testing, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Risk Management, Information Systems Security, Vulnerability Scanning, Vulnerability Assessments, Security Controls, Penetration Testing, Incident Response, Vendor Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Detecting and Mitigating Cyber Threats and Attacks

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring

    4.7
    Rating, 4.7 out of 5 stars
    ·
    459 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Risk Identification

    Skills you'll gain: Root Cause Analysis, Risk Analysis, Risk Management Framework, Risk Management, Project Risk Management, Brainstorming, Risk Control, Risk Appetite, Project Management Institute (PMI) Methodology, Stakeholder Engagement, Project Controls, Stakeholder Management, Compliance Management, Project Planning, Project Implementation, Focus Group

    4.6
    Rating, 4.6 out of 5 stars
    ·
    21 reviews

    Intermediate · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular threat+identification+and+mitigation courses

  • Customer Identification Program - US: SkillUp
  • Cybersecurity Prevention and Detection: Pearson
  • Cyber Threat Intelligence and Incident Response: Edureka
  • Name Screening and Reporting Obligations - US: SkillUp
  • Cyber Security: Essentials for Governance, Risk & Compliance: Macquarie University
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Risk Identification, Monitoring, and Analysis: ISC2
  • Cyber Security: Data & Identity Security: Macquarie University
  • Cybersecurity Threats and Security Program Development: John Wiley & Sons
  • Assets, Threats, and Vulnerabilities: Google

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok