Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat modeling"
University of Colorado Boulder
Skills you'll gain: Process Control, Machine Controls, Vibrations, Systems Engineering, Risk Control, Mathematical Modeling, Simulation and Simulation Software, Engineering Analysis, Engineering Calculations, Engineering Design Process, Applied Mathematics
Johns Hopkins University
Skills you'll gain: Data Science, Data Management, Data Modeling, Organizational Effectiveness, Data-Driven Decision-Making, Data Analysis, Project Design, Software Engineering, Machine Learning, Predictive Modeling, Statistical Inference, Presentations
Google Cloud
Skills you'll gain: Kubernetes, Threat Modeling, Hardening, Verification And Validation, Google Cloud Platform, Security Controls, Vulnerability Assessments, Infrastructure Security
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
University of Maryland, College Park
Skills you'll gain: Digital Transformation, Business Transformation, Analytics, Organizational Change, Data-Driven Decision-Making, Leadership, Organizational Strategy, Business Leadership, Technology Strategies, Strategic Leadership, Strategic Decision-Making, Business Analytics, Strategic Thinking, Customer Insights, Data Analysis, Business Strategy, Forecasting, Business Modeling, Innovation, Competitive Analysis
Skills you'll gain: General Networking, Network Architecture, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Network Routers, Security Controls, Cyber Attacks, Network Switches, Firewall, Security Strategy
University of Pennsylvania
Skills you'll gain: Statistical Machine Learning, Statistical Methods, Python Programming, Statistical Modeling, Supervised Learning, Machine Learning, Regression Analysis, Statistical Analysis, Classification And Regression Tree (CART), Applied Machine Learning, Machine Learning Algorithms, Data Science, Statistical Inference, Predictive Modeling, Probability & Statistics, Dimensionality Reduction
Skills you'll gain: Snowflake Schema, AWS Identity and Access Management (IAM), Amazon Web Services, Power BI, Dashboard, Data Visualization Software, Amazon S3, SQL, Data Modeling, Database Management, Data Integration, Data Warehousing, Business Intelligence, Cloud Computing
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Administration
Johns Hopkins University
Skills you'll gain: Network Analysis, Statistical Modeling, Bayesian Network, R Programming, Simulations, Applied Mathematics, Mathematical Modeling, Graph Theory, Data Analysis, Probability, Statistical Analysis, Markov Model, Probability Distribution, Machine Learning
Skills you'll gain: Anomaly Detection, Computer Vision, Image Analysis, Microsoft Azure, Data Ethics, Artificial Intelligence, Natural Language Processing, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Unsupervised Learning, Machine Learning, Predictive Modeling
In summary, here are 10 of our most popular threat modeling courses
- Spacecraft Formation Flying and Control Capstone Project:Â University of Colorado Boulder
- Ein Crashkurs in Datenwissenschaft:Â Johns Hopkins University
- Hardening Default GKE Cluster Configurations:Â Google Cloud
- Information Assurance Analysis:Â Johns Hopkins University
- Transforming with Data Analytics and Organization:Â University of Maryland, College Park
- Security Administration with Cisco Defense Orchestrator:Â LearnQuest
- Machine Learning Essentials:Â University of Pennsylvania
- Power BI Integration with AWS and Snowflake:Â Edureka
- Security Fundamentals and Identity Management:Â Packt
- Dell Technologies Networking & Security Technical Support:Â Dell