Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Anomaly Detection, Data Visualization, Generative AI, Risk Management, Data-Driven Decision-Making, ChatGPT, Data Synthesis, Compliance Management, Regulatory Compliance, Threat Detection, Data Pipelines, Automation, Predictive Analytics, Artificial Intelligence
Dartmouth College
Skills you'll gain: Predictive Analytics, Digital Transformation, Product Design, Predictive Modeling, Product Development, Business Transformation, New Product Development, Organizational Change, Data Strategy, Advanced Analytics, Design Thinking, Analytics, Agile Methodology, User Experience Design, Usability, Business Analytics, Innovation, Prototyping, Forecasting, Data-Driven Decision-Making
Skills you'll gain: Email Security, Data Loss Prevention, Google Workspace, Security Management, Threat Management, Malware Protection, Data Security, Cybersecurity
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Application Security, Cloud Security, Security Management, Application Programming Interface (API), Authentications, Threat Detection, Identity and Access Management, Multi-Factor Authentication, User Accounts
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Network Security, Threat Detection, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Google Cloud Platform, Identity and Access Management, Cloud Infrastructure
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Continuous Monitoring, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Network Troubleshooting, Identity and Access Management
University of Colorado Boulder
Skills you'll gain: Machine Learning Algorithms, Big Data, User Research, Internet Of Things, User Experience Design, User Experience, User Interface and User Experience (UI/UX) Design, Usability, Power Electronics, Verification And Validation, Analytics, Embedded Software, Persona (User Experience), File Systems, Usability Testing, User Centered Design, API Design, Process Control, Embedded Systems, Machine Controls
University of London
Skills you'll gain: Virtual Reality, Human Computer Interaction, Full-Stack Web Development, React Native, Agile Software Development, Data Ethics, Git (Version Control System), Event-Driven Programming, Version Control, Network Security, Web Applications, Computer Graphics, Relational Databases, Data Science, Natural Language Processing, Unsupervised Learning, Combinatorics, Web Development, Artificial Intelligence, Development Environment
University of London
Skills you'll gain: Virtual Reality, Human Computer Interaction, Full-Stack Web Development, React Native, Agile Software Development, Data Ethics, Git (Version Control System), Event-Driven Programming, Version Control, Network Security, Web Applications, Computer Graphics, Relational Databases, Data Science, Natural Language Processing, Unsupervised Learning, Combinatorics, Web Development, Artificial Intelligence, Development Environment
University of Colorado Boulder
Skills you'll gain: Computer Vision, Power Electronics, Debugging, Display Devices, Computer Displays, Image Analysis, Tensorflow, Semiconductors, Electrical Engineering, Engineering Documentation, Electronic Systems, Deep Learning, Artificial Neural Networks, Systems Design, USB, Technical Design, Software Design Documents, Computer Programming Tools, Test Engineering, Embedded Systems
Georgetown University
Skills you'll gain: Vulnerability Assessments, Operations Management, Data Storytelling, Business Strategy, Project Scoping, Competitive Intelligence, Survey Creation, Cyber Threat Intelligence, Social Justice, Business Ethics, Descriptive Statistics, Environment, Capital Budgeting, Market Opportunities, Storytelling, Marketing Planning, Leadership Studies, International Relations, Artificial Intelligence, Policy Development
O.P. Jindal Global University
Skills you'll gain: Econometrics, Survey Creation, Environment, Sampling (Statistics), Social Sciences, Economics, Policy, and Social Studies, Economic Development, Policy Analysis, International Relations, Diplomacy, Economics, Health Systems, Presentations, Tax, Complex Problem Solving, Research Methodologies, Public Policies, Governance, Socioeconomics, Mitigation
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- GenAI for Fraud Analysts: Improving Detection Efficiency:Â Coursera Instructor Network
- Digital Transformation Certificate:Â Dartmouth College
- Google Workspace Mail Management - Português Brasileiro: Google Cloud
- Google Workspace Security - Français: Google Cloud
- Networking in Google Cloud: Network Security - Français: Google Cloud
- Networking in Google Cloud: Network Security - 日本語版: Google Cloud
- Industrial Internet of Things Graduate Certificate:Â University of Colorado Boulder
- Graduate Certificate in Computer Science:Â University of London
- Graduate Diploma in Computer Science:Â University of London
- Power Electronics Graduate Certificate:Â University of Colorado Boulder