Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+identification+and+mitigation"
Skills you'll gain: DevOps, Mobile Security, Software Security, System Software, Cyberattacks, Leadership and Management
Skills you'll gain: Cryptography, Leadership and Management, Linux
Skills you'll gain: Audit, Computer Security Incident Management, Leadership and Management, Risk Management
Skills you'll gain: Security Strategy, Computer Security Incident Management, Python Programming, Computer Programming, Cryptography
Skills you'll gain: Linux, Network Security, Computer Security Incident Management, Leadership and Management
Skills you'll gain: Human Factors (Security), Security Engineering, Security Strategy, Software Security, System Security, Network Security, Security Software, Cyberattacks, Mobile Security
Skills you'll gain: Cryptography, Network Security, System Security
Skills you'll gain: Artificial Neural Networks
- Status: Free
The State University of New York
Skills you'll gain: Cyberattacks, Security Strategy, Conflict Management, Critical Thinking, Computer Networking, Computer Security Incident Management, Internet Of Things, Regulations and Compliance, Security Engineering, Strategy and Operations
Skills you'll gain: Cloud Computing, Cloud Platforms, Computer Security Models, Cyberattacks, Google Cloud Platform, Network Security, Security Engineering, Security Strategy, Software Security, System Security
University of Colorado System
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Network Security, Security Engineering, System Security, Computer Networking, Security Software, Computer Security Models, Security Strategy, Software Security
In summary, here are 10 of our most popular threat+identification+and+mitigation courses
- Incident Response and Digital Forensics:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Play It Safe: Manage Security Risks:Â Google
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Sound the Alarm: Detection and Response:Â Google
- Security Awareness Training:Â ISC2
- IT Security: Defense against the digital dark arts :Â Google
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- International Cyber Conflicts:Â The State University of New York
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud