Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security mitigation"
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Governance, Cyber Security Strategy, Risk Management, Security Awareness, Cyber Operations, Cyber Security Policies, Computer Security Incident Management, Human Factors (Security)
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Cybersecurity, General Networking, Authorization (Computing), Web Applications, Security Controls, Web Servers, Authentications
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Governance, Risk Modeling, Cyber Security Strategy
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Malware Protection, Application Performance Management, Event Monitoring, Incident Response, Incident Management, Virtual Machines, Anomaly Detection, Query Languages
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Endpoint Security, Threat Detection, Incident Response
In summary, here are 10 of our most popular security mitigation courses
- Application Security for Developers and DevOps Professionals:Â IBM
- Cybersecurity Testing and Prevention:Â Microsoft
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Security Operations:Â ISC2
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Security Governance & Compliance:Â University of California, Irvine
- Security and Risk Management:Â Packt
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Network Security:Â Cisco Learning and Certifications
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University