Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat intelligence"
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Mobile Security, Computer Security Incident Management, Investigation, Mobile Development, Cybersecurity, Criminal Investigation and Forensics, Android (Operating System), Apple iOS, Application Security, Computer Security, Malware Protection, Legal Proceedings, Analysis, Secure Coding, Cloud Security, Security Strategy, File Systems, Debugging, Disaster Recovery, Encryption
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Systems Analysis, Data Integrity, File Management, Data Storage, Computer Security Incident Management, Regulation and Legal Compliance, Mobile Development Tools, Incident Response, Endpoint Security, Graphical Tools, Malware Protection, Network Analysis, Disaster Recovery, Graphics Software
- Status: New
Skills you'll gain: Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Security Testing, Application Security, Security Engineering, Cyber Security Strategy, Cybersecurity, Cyber Security Assessment, Vulnerability Assessments, DevSecOps, Risk Management Framework, Open Web Application Security Project (OWASP), Software Development Life Cycle, Cloud Security
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Public Key Infrastructure, Data Security, Key Management, Blockchain, Cybersecurity, Data Encryption Standard, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Security Management, Hardware Architecture
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Network Protocols, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Mitigation, Incident Management, Identity and Access Management
- Status: Free Trial
Corporate Finance Institute
Skills you'll gain: Data Analysis Expressions (DAX), Power BI, Data Modeling, Business Intelligence, Microsoft Excel, Excel Formulas, Pivot Tables And Charts, Data Analysis Software, Data Manipulation, Data Transformation, Time Series Analysis and Forecasting
- Status: Free Trial
Politecnico di Milano
Skills you'll gain: Artificial Intelligence, Artificial Neural Networks, Responsible AI, Computer Science, Computer Vision, Machine Learning, Data Ethics, Natural Language Processing, Deep Learning
University of London
Skills you'll gain: Security Management, Human Factors (Security), Information Privacy, Key Management, Security Testing, Cyber Governance, Infrastructure Security, Threat Modeling, Business Continuity Planning, Application Security, OSI Models, Malware Protection, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, Cryptography, ISO/IEC 27001, Data Collection, Data Analysis
- Status: Preview
Skills you'll gain: Data-Driven Decision-Making, Data Management
In summary, here are 10 of our most popular cyber threat intelligence courses
- Cyber Security: Mobile Security:Â Macquarie University
- Cyber Security: Digital Forensics:Â Macquarie University
- Modelling Threats - Strategies in Threat Modelling:Â Packt
- Cyber Security: Applied Cryptography:Â Macquarie University
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Cyber Secure Coder (CSC-110) :Â Packt
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Intermediate DAX & Time Intelligence:Â Corporate Finance Institute
- Artificial Intelligence: An Overview:Â Politecnico di Milano