Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat modeling"
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
University of Pennsylvania
Skills you'll gain: Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Financial Modeling, Business Mathematics, Predictive Modeling, Probability, Operations Research, Business Process Modeling, Business Risk Management, Statistical Analysis, Probability Distribution, Simulation and Simulation Software
University of Pennsylvania
Skills you'll gain: Risk Modeling, Financial Statements, Probability Distribution, Mathematical Modeling, Statistical Modeling, Portfolio Management, Regression Analysis, Business Modeling, Financial Modeling, Risk Management, Quantitative Research, Presentations, Decision Making, Data Visualization, Microsoft PowerPoint, Predictive Modeling, Investment Management, Spreadsheet Software, Google Sheets, Excel Formulas
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
- Status: [object Object]
Skills you'll gain: Dashboard, Data Visualization Software, Data Wrangling, Data Visualization, SQL, Supervised Learning, Feature Engineering, Plotly, Interactive Data Visualization, Jupyter, Exploratory Data Analysis, Data Mining, Data Cleansing, Matplotlib, Data Analysis, Unsupervised Learning, Generative AI, Pandas (Python Package), Data Manipulation, Professional Networking
In summary, here are 10 of our most popular threat modeling courses
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- AI for Cybersecurity:Â Johns Hopkins University
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Google Cybersecurity:Â Google
- Assets, Threats, and Vulnerabilities:Â Google
- Fundamentals of Quantitative Modeling:Â University of Pennsylvania
- Business and Financial Modeling:Â University of Pennsylvania
- Threat Response:Â Cisco Learning and Certifications
- Introduction to the Threat Intelligence Lifecycle :Â IBM