Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat model"
Duke University
Skills you'll gain: PyTorch (Machine Learning Library), Reinforcement Learning, Image Analysis, Applied Machine Learning, Deep Learning, Machine Learning, Natural Language Processing, Supervised Learning, Artificial Neural Networks, Computer Vision, Regression Analysis
University of Colorado Boulder
Skills you'll gain: Electrical Safety, Simulations, Estimation, Thermal Management, Power Electronics, Electronic Components, Mathematical Modeling, Low Voltage, Electrical Engineering, Basic Electrical Systems, Systems Engineering, Failure Mode And Effects Analysis, Simulation and Simulation Software, Safety Assurance, Matlab, Electronic Systems, Engineering Calculations, Failure Analysis, Applied Mathematics, Verification And Validation
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Incident Response, Cyber Operations, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Supplier Management, Procurement, Supplier Relationship Management, Supplier Performance Management, Negotiation, Contract Negotiation, Request For Quotation (RFQ), Stakeholder Management, Contract Management, Market Analysis, Purchasing, Stakeholder Engagement, Supply Management, Request for Proposal, Competitive Analysis, Risk Management, Supply Chain Management, Vendor Contracts, Business Ethics
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Strategic Decision-Making, Business Valuation, Private Equity, Mergers & Acquisitions, Game Theory, Corporate Strategy, Financial Analysis, Business Strategy, Investment Banking, Financial Modeling, Cash Flows, Growth Strategies, Corporate Finance
University of Colorado Boulder
Skills you'll gain: Security Strategy, Communication, Problem Solving
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cryptographic Protocols, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Arizona State University
Skills you'll gain: Design Research, Innovation, Creativity, Design Thinking, Creative Thinking, Design, Brainstorming, Creative Problem-Solving, Ideation, Design Strategies, Aesthetics, Business Planning, Resourcefulness, Curiosity, User Experience Design, Research and Design, New Product Development, Problem Solving, Product Development, Human Centered Design
Kennesaw State University
Skills you'll gain: Risk Management, Leadership and Management
Georgia Institute of Technology
Skills you'll gain: Supply Chain, Supply Chain Management, Supply Chain Planning, Logistics, Transportation Operations, Procurement, Warehouse Operations, Inventory Control, Manufacturing Operations, Emerging Technologies
Emory University
Skills you'll gain: Mental and Behavioral Health Specialties, Pharmaceuticals, Human Learning, Social Sciences, Behavioral Health, Psychology, Mental Health, Public Policies, Vulnerability, Behavior Management, Policy Analysis, Medical Science and Research, Patient Treatment, Clinical Trials, Risk Analysis
University of Michigan
Skills you'll gain: Statistical Hypothesis Testing, Sampling (Statistics), Statistical Modeling, Statistical Inference, Statistical Methods, Bayesian Statistics, Data Visualization, Statistics, Matplotlib, Statistical Visualization, Statistical Software, Probability & Statistics, Statistical Analysis, Jupyter, Statistical Programming, Regression Analysis, Data Visualization Software, Predictive Modeling, Exploratory Data Analysis, Data Analysis
In summary, here are 10 of our most popular threat model courses
- Introduction to Machine Learning:Â Duke University
- Algorithms for Battery Management Systems:Â University of Colorado Boulder
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Global Procurement and Sourcing:Â Rutgers the State University of New Jersey
- Advanced Valuation and Strategy - M&A, Private Equity, and Venture Capital:Â Erasmus University Rotterdam
- Cybersecurity for Data Science:Â University of Colorado Boulder
- Cybersecurity Fundamentals:Â IBM
- Creatividad, diseño e innovación: Técnicas y herramientas: Arizona State University
- A General Approach to Risk Management:Â Kennesaw State University
- Supply Chain Principles:Â Georgia Institute of Technology