- Security Strategy
- Threat Modeling
- Vulnerability Management
- Data Security
- Identity and Access Management
- Security Controls
- Cyber Attacks
- Authentications
- Malware Protection
- Authorization (Computing)
- Threat Detection
- Vulnerability Assessments
Assets, Threats, and Vulnerabilities
Completed by Vard Keem Atuel
December 6, 2023
19 hours (approximately)
Vard Keem Atuel's account is verified. Coursera certifies their successful completion of Assets, Threats, and Vulnerabilities
What you will learn
Classify assets
Analyze an attack surface to find risks and vulnerabilities
Identify threats, such as social engineering, malware and web-based exploits
Summarize the threat modeling process
Skills you will gain

