Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
Georgetown University
Skills you'll gain: Vulnerability Assessments, Operations Management, Data Storytelling, Business Strategy, Project Scoping, Competitive Intelligence, Survey Creation, Cyber Threat Intelligence, Social Justice, Business Ethics, Descriptive Statistics, Environment, Capital Budgeting, Market Opportunities, Storytelling, Marketing Planning, Leadership Studies, International Relations, Artificial Intelligence, Policy Development
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Intelligence Collection and Analysis, Risk Mitigation, Environment, Sampling (Statistics), R Programming, Survey Creation, Environmental Issue, Political Sciences, Economic Development, International Relations, Cybersecurity, Socioeconomics, Governance, Emerging Technologies, Public Safety and National Security, Mitigation, Social Sciences, Security Strategy, Conflict Management
Universidad de Palermo
Skills you'll gain: Business Modeling, Data Storytelling, Selling Techniques, Human Capital, Business Process Management, Portfolio Management, Business Planning, Business Analytics, Strategic Marketing, Digital Transformation, Equities, Management Accounting, Organizational Strategy, Corporate Sustainability, Entrepreneurial Finance, Market Dynamics, B2B Sales, Statistical Methods, Marketing Planning, Teamwork
West Virginia University
Skills you'll gain: Unified Modeling Language, Verification And Validation, Threat Modeling, Security Management, Secure Coding, Scope Management, Application Security, Financial Statements, Proposal Development, Cash Flows, Object Oriented Design, Requirements Analysis, Software Design, Security Requirements Analysis, Incident Response, Database Design, Configuration Management, Business Process Management, Object Oriented Programming (OOP), Mobile Development
In summary, here are 4 of our most popular cyber threat mitigation techniques courses
- Bachelor of Arts in Liberal Studies:Â Georgetown University
- M.A. in International Relations, Security, and Strategy:Â O.P. Jindal Global University
- MaestrÃa en Dirección de Empresas (MBA): Universidad de Palermo
- Master of Science in Software Engineering:Â West Virginia University