Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat identification and mitigation"
Skills you'll gain: Systems Administration, Cloud Infrastructure, IT Infrastructure, Lightweight Directory Access Protocols, Active Directory, Disaster Recovery, Server Administration, Linux Administration, Cloud Computing, Servers, Network Administration, Windows Servers, Technical Support and Services, Data Storage, Virtualization, User Accounts
Skills you'll gain: Search Engine Marketing, Search Engine Optimization, Target Audience, Digital Marketing, Persona Development, Web Analytics and SEO, Marketing, Customer Engagement, Customer Acquisition Management, Advertising, Marketing Strategies, Lead Generation
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Continuous Integration, Software Configuration Management, Software Development Tools, Code Review, Remote Access Systems, Issue Tracking, Command-Line Interface
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
Skills you'll gain: Threat Management, Cybersecurity, Cyber Risk, Computer Security Incident Management, Risk Management Framework, Risk Management, Incident Response, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Auditing, Compliance Auditing
Google
Skills you'll gain: Generative AI, Productivity Software, Artificial Intelligence, Data Ethics, Innovation, Automation, Workflow Management, Information Privacy, Machine Learning, Human Computer Interaction, Content Creation, Natural Language Processing
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Application Deployment, Cloud Storage, Containerization, Infrastructure As A Service (IaaS), Cloud Computing, CI/CD, Cloud-Native Computing, Cloud Computing Architecture, Cloud Security, Cloud Management, Cloud Services, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Network Planning And Design
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Cloud Storage, Containerization, Infrastructure As A Service (IaaS), Cloud-Native Computing, Cloud Computing Architecture, Cloud Management, Cloud Services, Load Balancing, Cloud Engineering, Application Deployment, Infrastructure as Code (IaC), Virtual Machines, Cloud Computing, Data Storage, Network Infrastructure, Docker (Software)
In summary, here are 10 of our most popular threat identification and mitigation courses
- System Administration and IT Infrastructure Services: Google
- Attract and Engage Customers with Digital Marketing: Google
- Tools of the Trade: Linux and SQL: Google
- The Bits and Bytes of Computer Networking: Google
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Foundations: Data, Data, Everywhere: Google
- Introduction to Git and GitHub: Google
- Programming for Everybody (Getting Started with Python): University of Michigan
- Play It Safe: Manage Security Risks: Google
- Google AI Essentials: Google