Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Counterterrorism Course Catalog
- Status: Free Trial
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Crisis Management, Information Assurance
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Applied Machine Learning
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Authentications, Security Strategy, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Cleansing, Data Management, Data Validation, Data Quality, Data Integrity, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Routing, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
Infosec
Skills you'll gain: Network Analysis, Network Security, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols, TCP/IP
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
- Status: Free Trial
Skills you'll gain: Cloud Security, Cyber Security Policies, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Security Controls
- Status: NewStatus: Free Trial
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Data Security, Linux, System Monitoring
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Incident Response, BC, and DR Concepts:Â ISC2
- Intrusion Detection:Â Johns Hopkins University
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Information Assurance Analysis:Â Johns Hopkins University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Defensive Python:Â Infosec
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University