Search result for Threat identification and mitigation Online Courses & Certifications
Get Course Alerts by Email
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
Common Vulnerabilities and Weaknesses Introduction to Threats and Mitigations Open source threat and mitigation information Open source threat and mitigation information Software Life Cycle and Management considerations Software Life Cycle and Management considerations...
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
Students will fully learn the nature and scope of today’s cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. LAB SETUP START HERE: Connecting to the NDG platform and performing labs. Discovery: Endpoint Protection and Malware Mitigation Essentials II: Module 3 - Threat Prevention and Intelligence Reading: Threat Prevention and Intelligence...
Become Zero to hero in Risk Management Fundamentals
by Varinder K- 4.8
2 hours on-demand video
Section 2 describes the Risk Management Terminologies, and and you will learn below concepts: What is Impact and Likelihood Section 3 discusses Risk Management Frameworks and you will learn below concepts: ISO/IEC31000, ISO 27005, NIST SP 800-37 and NIST SP 800-39 Section 7 discusses about Risk Mitigation - Part 03 Deep Dive and you will learn below concepts:...
$11.99
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)
by Total Seminars • 750,000+ Enrollments- 4.6
11.5 hours on-demand video
Ethical Hacking and CompTIA Cyber Security Analyst CySA+ (CS0-002) Exam Prep Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Leverage intelligence and threat detection techniques Threat and Vulnerability Management (22% of the exam) Threat data and intelligence Business impact analysis and organizational risk mitigation...
$20.99
CompTIA Security+ Certification Exam - Mock Test
by BINKIS DEV- 2.5
Exam Description: The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations....
$12.99
Tourism and Climate Change
by Prof. Dr. Edward Huijbens , Dr. Arjaan Pellis , Dr. Bas Amelung , Dr. Machiel Lamers- 0.0
5 Weeks
Global tourism’s CO2 emissions and overall environmental impact are substantial. For instance, numerous small islands and coral reefs are under threat of devastating storms and sea level rise. Climate change adaptation and mitigation for tourism destinations You will engage with fellow learners in (re-)modelling various case studies related to adaptation and mitigation....
$199
Sustainable Business Models in Microfinance
by Swarnalatha Ramakrishnan , Prasada Rao G.E.V. , Karuna Yarasi , Vani N- 0.0
5 Weeks
Comprehend Ecosystem of Microfinance and its impact on inclusive growth through studying sustainable microfinance business models. Comprehend the ecosystem of microfinance, understand its impact on inclusive growth, and learn to identify sustainable business models financing Micro Enterprises and Livelihood Activities. Overview of Risk, Identification, Assessment and Mitigation of Risk in Microfinance Institutions...
$149
Related searches
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. Understanding detection and mitigation...
Check Point Jump Start: SMB Network Security
by Check Point Software Technologies- 0.0
Approx. 2 hours to complete
In addition, this course will teach you how to configure and view network traffic and threat prevention log data, as well as how to monitor your SMB deployment. Threat Emulation and Sandboxing DDoS attacks and the Mitigation Light feature Understand advanced features such as SSL Inspection, Threat emulation, and High Availability...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Secure Big Data Systems & Operate and Secure Virtual Environments Operate and Secure Virtual Environments: SDN Operate and Secure Virtual Environments: Virtual Appliances...