Search result for Threat identification and mitigation Online Courses & Certifications
Get Course Alerts by Email
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick...
Microsoft Cybersecurity Pro Track: Threat Detection
by Cristian Calinescu- 0.0
6 hours on-demand video
List the capabilities of on-premise threat detection and mitigation tools Name the capabilities of hybrid and cloud threat detection and mitigation tools Threat Detection ( Detect security breaches early - explore the capabilities of Microsoft's threat detection and mitigation tools - including hands on Lab) Powershell Security ( Learn how to use Powershell to enhance security and remediate new threats....
$12.99
Risk Management in Banks
by Poonam Tewari , Vijai Kumar Singh , Vivek Gangwar , Pawan Kumar- 0.0
4 Weeks
Learn about the risks faced by banks and how they identify, assess & mitigate these risks. The emphasis will be on management of Credit Risk, Market Risk, Operational Risk and Enterprise Risk. In this course, we will learn about the risks faced by Banks and the methodologies adopted by Banks for identification, measurement, monitoring and mitigation of risk....
$149
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. DDoS Mitigation and Prevention on Google Cloud Infrastructure, Data Protection, Logging and Compliance Partners Content-Related Vulnerabilities: Techniques and Best Practices Threat Mitigation Strategies for Content...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Data-driven technologies like AI, when designed with ethics in mind, benefit both the business and society at large. But it’s not enough to say you will “be ethical” and expect it to happen. Threat and Risk Libraries Threat Modeling and Analysis Tools Evaluate risk identification and mitigation strategies within the lifecycle....
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will leave the course with skills relating to threat modeling and business continuity planning that have direct applications at your current job or in your future career....
Penetration Testing - Discovering Vulnerabilities
by Aspen Olmsted- 0.0
5 Weeks
Learn fundamentals of penetration testing, including an Introduction to Penetration Testing Methodologies, Recognisance and Enumeration for Penetration Testers, Scanning and Vulnerability Enumeration. Students will gain hands-on experience scanning for targets and vulnerabilities. The class concludes with threat modeling and vulnerability identification. During the threat modeling and vulnerability identification phase, the tester identifies targets and maps the attack vectors....
$166
Related searches
Project Risk Management
by Khalid Abdelaal- 4.3
2.5 hours on-demand video
Practice of identifying , analyzing, prioritizing and mitigating risks cost, time and other objectives This identify, analyze, and mitigate risks. I have deigned this course in a simple way that enable you to understand risks and we start the course from early beginning explaining definition of risks and how to identify , analyze, mitigate and control risks....
$9.99
Tourism and Climate Change
by Prof. Dr. Edward Huijbens , Dr. Arjaan Pellis , Dr. Bas Amelung , Dr. Machiel Lamers- 0.0
5 Weeks
Global tourism’s CO2 emissions and overall environmental impact are substantial. For instance, numerous small islands and coral reefs are under threat of devastating storms and sea level rise. Climate change adaptation and mitigation for tourism destinations You will engage with fellow learners in (re-)modelling various case studies related to adaptation and mitigation....
$199
Microsoft 70-744: Securing Windows Server 2016
by Integrity Training- 0.0
13.5 hours on-demand video
This course also teaches the in-depth knowledge about mitigation of malware, spyware and other threats that can compromise the security and integrity of any organization’s data. The course teaches the students on how to use the Advanced Threat Analysis feature in Windows Server 2016, securing virtualization platform, and use new deployment options....
$15.99