Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat assessment"
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Rice University
Skills you'll gain: Communication Planning, Stakeholder Management, Organizational Structure, Project Documentation, Project Management, Project Management Life Cycle, Project Scoping, Project Planning, Requirements Management, Financial Analysis, Business Analysis, Peer Review
- Status: Free
Lund University
Skills you'll gain: Editing, Proofreading, Writing, Grammar, Literacy, Critical Thinking, Style Guides, Vocabulary, Detail Oriented
- Status: Free
Skills you'll gain: Motivational Interviewing, Psychiatry, Patient Treatment, Social Justice, Mental and Behavioral Health Specialties, Psychotherapy, Case Management, Treatment Planning, Patient Education and Support, Clinical Psychology, Medication Administration, Care Coordination, Behavioral Health, Health Assessment, Patient Referral, Pharmaceuticals, Interviewing Skills, Mental Health, Risk Analysis
University of Colorado System
Skills you'll gain: Vital Signs, Emergency Medical Services, Medical Terminology, Health Assessment, Emergency Medicine, Triage, Medical Records, Patient Safety, Anatomy, Patient Treatment, Emergency Response, Safety Assurance, Stress Management
In summary, here are 10 of our most popular threat assessment courses
- AI for Cybersecurity:Â Johns Hopkins University
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cyber Incident Response:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- In the Trenches: Security Operations Center :Â EC-Council
- Managing Threat Intelligence with Cortex XSOAR:Â Google Cloud
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Engineering Project Management: Initiating and Planning:Â Rice University
- Writing in English at University:Â Lund University