Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber risk quantification"
Skills you'll gain: Security Controls, Incident Response, Cyber Risk, Vulnerability Management, Cyber Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Security Management, IT Management, Risk Management, Cyber Security Policies, Threat Detection, Penetration Testing, Cyber Security Assessment, Business Risk Management, Data Security, Disaster Recovery, Business Continuity Planning
University of Colorado System
Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, User Requirements Documents, Scalability, Verification And Validation
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Governance, Cyber Security Strategy, Risk Management, Security Awareness, Cyber Operations, Cyber Security Policies, Computer Security Incident Management, Human Factors (Security)
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Risk Management, System Monitoring, Security Testing, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk, Configuration Management, Information Systems Security
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Business Risk Management, IT Management, Vulnerability Management, Risk Mitigation, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Risk Control, Cybersecurity, Threat Modeling, Vulnerability Assessments, Incident Response
Skills you'll gain: Risk Management, IT Management, Risk Appetite, Business Risk Management, Operational Risk, Risk Analysis, Governance, Regulatory Requirements, Organizational Structure, Change Management, Accountability
In summary, here are 10 of our most popular cyber risk quantification courses
- Risk Management for Cyber Security Managers:Â Packt
- Software Requirements Prioritization: Risk Analysis:Â University of Colorado System
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Introduction to Cyber Security:Â New York University
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Cyber Security Fundamentals:Â University of London
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- NIST Cybersecurity and Risk Management Frameworks:Â Packt
- Security and Risk Management:Â Packt