Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat modeling"
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
University of Minnesota
Skills you'll gain: Operations Research, Supply Chain, Business Analytics, Mathematical Modeling, Process Optimization, Manufacturing Operations, Workforce Planning, Microsoft Excel, Resource Allocation, Finance, Production Planning, Investment Management, Decision Making
University of Pennsylvania
Skills you'll gain: Financial Statements, Return On Investment, Financial Statement Analysis, Finance, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Working Capital, Balance Sheet, Accrual Accounting, Accounting, Cash Flows, Income Statement, Generally Accepted Accounting Principles (GAAP), Financial Analysis, Tax Planning, Equities, Financial Planning, Corporate Finance
Duke University
Skills you'll gain: Presentations, Data Storytelling, Data Presentation, Database Design, MySQL, Relational Databases, SQL, Data Visualization, Business Analytics, Business Metrics, Data Visualization Software, Business Process Improvement, Business Intelligence, Tableau Software, Financial Modeling, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
University of California, Davis
Skills you'll gain: Data Governance, SQL, Data Quality, Query Languages, Data Manipulation, Data Modeling, Relational Databases, Data Science, Data Analysis, Database Management Systems, Descriptive Statistics
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Infrastructure Security, Real Time Data
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Storage
In summary, here are 10 of our most popular threat modeling courses
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Advanced Models for Decision Making:Â University of Minnesota
- Introduction to Finance and Accounting:Â University of Pennsylvania
- Excel to MySQL: Analytic Techniques for Business:Â Duke University
- Cyber Attack Countermeasures:Â New York University
- Security and Risk Management:Â Packt
- Cyber Security in Manufacturing :Â University at Buffalo
- Managing Network Security:Â Kennesaw State University
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- SQL for Data Science:Â University of California, Davis