Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+assessment"
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Security Management, Cyber Security Policies, Cyber Risk, Cyber Security Strategy, Information Assurance, Compliance Auditing
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of Illinois Urbana-Champaign
Skills you'll gain: Data Mining, Program Evaluation, Pedagogy, Unstructured Data, Predictive Modeling, Information Privacy, Natural Language Processing
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
- Status: Free
Coursera Instructor Network
Skills you'll gain: Project Risk Management, Risk Management, Risk Management Framework, Risk Analysis, Risk Mitigation, Business Risk Management, Governance Risk Management and Compliance, Continuous Monitoring, Stakeholder Communications
In summary, here are 10 of our most popular threat+assessment courses
- IBM Cybersecurity Analyst: IBM
- Play It Safe: Manage Security Risks: Google
- Data & Cybersecurity: Campus BBVA
- Sound the Alarm: Detection and Response: Google
- Assets, Threats, and Vulnerabilities: Google
- Microsoft Cybersecurity Analyst: Microsoft
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Assessment for Learning: University of Illinois Urbana-Champaign
- Introduction to the Threat Intelligence Lifecycle : IBM
- Incident Response and Digital Forensics: IBM