- Identity and Access Management
- Vulnerability Assessments
- Cyber Threat Intelligence
- NIST 800-53
- Security Controls
- Authentications
- Authorization (Computing)
- Vulnerability Management
- Threat Detection
- Data Security
- Threat Modeling
- Malware Protection
Assets, Threats, and Vulnerabilities
Completed by Prakyath Ashok Shetty
May 9, 2024
19 hours (approximately)
Prakyath Ashok Shetty 's account is verified. Coursera certifies their successful completion of Assets, Threats, and Vulnerabilities
What you will learn
Classify assets
Analyze an attack surface to find risks and vulnerabilities
Identify threats, such as social engineering, malware and web-based exploits
Summarize the threat modeling process
Skills you will gain

