Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat model"
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
University of Pennsylvania
Skills you'll gain: Risk Modeling, Probability Distribution, Mathematical Modeling, Risk Management, Data Visualization, Predictive Modeling, Data Modeling, Probability, Strategic Decision-Making, Simulation and Simulation Software, Forecasting, Data-Driven Decision-Making, Statistics, Microsoft Excel
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Data Wrangling, Data Cleansing, Data Analysis, Data Manipulation, Data Transformation, Data Import/Export, Exploratory Data Analysis, Predictive Analytics, Statistical Analysis, Regression Analysis, Predictive Modeling, Pandas (Python Package), Scikit Learn (Machine Learning Library), Statistical Modeling, Machine Learning Methods, Feature Engineering, Python Programming, Data Pipelines, NumPy
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: Free
Yale University
Skills you'll gain: Psychology, Mental and Behavioral Health Specialties, Psychiatry, Mental Health, Human Development, Human Learning, Social Sciences, Psychotherapy, Behavioral Health, Sociology, Creativity, Non-Verbal Communication
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Yale University
Skills you'll gain: Growth Mindedness, Optimism, Positive Behavior Support, Goal Setting, Resilience, Self-Motivation, Self-Awareness, Emotional Intelligence, Mental Health, Psychology, Social Skills, Decision Making, Time Management
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
In summary, here are 10 of our most popular threat model courses
- Assets, Threats, and Vulnerabilities:Â Google
- Modeling Risk and Realities:Â University of Pennsylvania
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Google Cybersecurity:Â Google
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Data Analysis with Python:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Introduction to Psychology :Â Yale University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft