Search result for Threat analysis Online Courses & Certifications
Get Course Alerts by Email
Understanding International Relations Theory
by Timofei Bordachev , Dmitrii Suslov- 4.7
Approx. 24 hours to complete
The course combines historic approach and analysis of the modern political problems. The lectures also include broad outline of the modern concepts and debates in the context of the contemporary political problems, such as rise of China and other emerging powers, threat of terrorism, US-Russia confrontation, etc. Neorealism and political analysis...
Introduction to Cyber Security
by Arosha K. Bandara- 0.0
8
Threat landscape: terminology, cyber security threats, keeping up to dateAuthentication: access control, passwords, two-factor authenticationMalware: types of malware, attack vectors, preventing infectionNetworking and communications: fundamentals, security challenges, standardsCryptography: symmetric and asymmetric cryptography, applicationsNetwork security: firewalls, virtual private networks, intrusion detection / preventionWhen your defences fail: cyber security laws, recovering from attacksManaging security risks: risk analysis and management...
Free
Complete MBA course: Marketing and Business Strategy
by Navdeep Yadav- 4.4
7.5 hours on-demand video
SWOT analysis Section 2 Marketing insights and analysis b ) Business analysis Porter five competitive forces (Competitive rivalry, Threat of new entrance, Power of suppliers, Power of customers, Threat of substitute products) Strengths, Weaknesses, Opportunities, and Threats SWOT Analysis...
$15.99
CompTIA CySA+ (CS0-002) Complete Course & Practice Exam
by Jason Dion • 600,000+ Enrollments Worldwide- 4.7
32.5 hours on-demand video
This CySA+ (CS0-002) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts. Threat and Vulnerability Management (22%)...
$14.99
Cyber Security: Learn How to Protect Your System & Web App
by Thinkahead Academy, LLC.- 0.0
4.5 hours on-demand video
Learn how to analyze a web application using application threat modeling Learn how to perform log analysis to identify suspicious activities...
$12.99
Microsoft 70-744: Securing Windows Server 2016
by Integrity Training- 0.0
13.5 hours on-demand video
The course teaches the students on how to use the Advanced Threat Analysis feature in Windows Server 2016, securing virtualization platform, and use new deployment options....
$15.99
Secure Software Development: Verification and More Specialized Topics
by David A. Wheeler- 0.0
7 Weeks
Learn how to verify software for security, and take a deeper dive into the basics of applying threat models and cryptography. Threat modeling/Attack modeling: How to consider your system from an attacker’s point of view and how to apply a simple design analysis approach called STRIDE....
$199
Related searches
Epidemics
by Gabriel M. Leung (HKU) , Joseph T. Wu (HKU) , Kwok-Yung Yuen (HKU) , Tommy Lam (HKU) , Maria Huachen Zhu (HKU) , Guan Yi (HKU) , Benjamin Cowling (HKU) , Thomas Abraham (HKU) , Mark Jit (LSHTM) , Malik Peiris (HKU) , Marc Lipsitch (Harvard)- 4.9
Approx. 47 hours to complete
Despite all the remarkable technological breakthroughs that we have made over the past few decades, the threat from infectious diseases has significantly accelerated. Analysis of the spread of infectious diseases;...
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Threat Modeling, or Architectural Risk Analysis PROGRAM ANALYSIS Flow Analysis Context Sensitive Analysis...
Career Success Project
by Patricia Bravo, MBA, SPHR , Dave Nagy , Rob Stone, PMP, M.Ed. , David Standen, MBA , Sue Robins, M.S. Ed. , Margaret Meloni, MBA, PMP- 4.7
Approx. 4 hours to complete
SWOT Analysis Analysis Paper...