Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Counterterrorism Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Security, Network Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
- Status: Free Trial
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Crisis Management, Information Assurance
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Applied Machine Learning
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: Data Security, Network Security, Security Testing, Cybersecurity, Infrastructure Security, Identity and Access Management, Cloud Security, Security Controls, Threat Detection, Firewall, OSI Models, Encryption, Single Sign-On (SSO), Computer Networking, Incident Response, Public Key Infrastructure
- Status: New
Skills you'll gain: Incident Response, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Modeling, Vulnerability Scanning, Threat Detection, Intrusion Detection and Prevention, Application Security, Penetration Testing, Network Security, Malware Protection, Network Analysis
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Authentications, Security Strategy, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Case Western Reserve University
Skills you'll gain: Trial Preparation, Court Systems, Criminal Investigation and Forensics, Legal Proceedings, Legal Hearings, Litigation and Civil Justice, International Relations, Legal Strategy, Diplomacy, Public Safety and National Security, Ethical Standards And Conduct, Case Law, Intelligence Collection and Analysis, Interactive Learning, Student Engagement
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Cleansing, Data Management, Data Validation, Data Quality, Data Integrity, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Routing, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Security Architecture & Operations:Â Packt
- Security Concepts and Practices:Â ISC2
- Incident Response, BC, and DR Concepts:Â ISC2
- Intrusion Detection:Â Johns Hopkins University
- Protection of Information Assets:Â Whizlabs
- CyberSec First Responder (CFR-310):Â Packt
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Introduction to International Criminal Law:Â Case Western Reserve University