Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+identification+and+mitigation"
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Security Management, Cyber Security Policies, Cyber Risk, Cyber Security Strategy, Information Assurance, Compliance Auditing
- Status: Free
Campus BBVA
Skills you'll gain: Incident Management, Crisis Management, Security Information and Event Management (SIEM), Data Security, Cybersecurity, Cyber Attacks, Security Strategy, Information Systems Security, Cyber Operations, Information Assurance, Data Processing, Security Awareness, Network Security, Anomaly Detection, Data Science, Time Series Analysis and Forecasting, Unsupervised Learning
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Google Cloud Platform, Data Security, Application Security, Threat Detection, Continuous Monitoring, Cloud Management, IT Automation, Identity and Access Management
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
In summary, here are 10 of our most popular threat+identification+and+mitigation courses
- Play It Safe: Manage Security Risks: Google
- Data & Cybersecurity: Campus BBVA
- Sound the Alarm: Detection and Response: Google
- Assets, Threats, and Vulnerabilities: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Security Awareness Training: ISC2
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Introduction to the Threat Intelligence Lifecycle : IBM
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud