Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat model"
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
University of Pennsylvania
Skills you'll gain: Risk Modeling, Probability Distribution, Mathematical Modeling, Risk Management, Data Visualization, Predictive Modeling, Data Modeling, Probability, Strategic Decision-Making, Simulation and Simulation Software, Forecasting, Data-Driven Decision-Making, Statistics, Microsoft Excel
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
- Status: Free
Yale University
Skills you'll gain: Positive Behavior Support, Goal Setting, Resilience, Self-Awareness, Behavioral Economics, Emotional Intelligence, Mental Health, Psychology, Social Skills, Time Management
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Johns Hopkins University
Skills you'll gain: Triage, Crisis Intervention, Rapport Building, Emergency Response, Trauma Care, First Aid, Interpersonal Communications, Community Mental Health Services, Mental Health, Stress Management, Patient Referral, Health Assessment
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
Johns Hopkins University
Skills you'll gain: Regression Analysis, Statistical Analysis, Statistical Modeling, Correlation Analysis, Data Analysis, Statistical Methods, Predictive Modeling, Probability & Statistics, Statistical Inference, Statistical Hypothesis Testing
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
In summary, here are 10 of our most popular threat model courses
- Assets, Threats, and Vulnerabilities:Â Google
- Modeling Risk and Realities:Â University of Pennsylvania
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Google Cybersecurity:Â Google
- The Science of Well-Being:Â Yale University
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Psychological First Aid:Â Johns Hopkins University
- Threat Response:Â Cisco Learning and Certifications
- Regression Models:Â Johns Hopkins University
- IBM Cybersecurity Analyst:Â IBM