Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
55credentials
1online degree
159courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cloud Management, Cloud Security, Application Security, Cloud Computing, Cloud Infrastructure, Cloud Applications, IT Security Architecture, Identity and Access Management, Data Integrity, Secure Coding, Private Cloud, Security Awareness, Data Centers, Data Management, Personally Identifiable Information, Threat Modeling, Security Testing, Security Controls, General Data Protection Regulation (GDPR), Service Level

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

  • Status: Preview

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)

  • Status: Free Trial

    Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning

  • Status: Free Trial

    Skills you'll gain: Network Security, Network Troubleshooting, Software-Defined Networking, Network Monitoring, Threat Modeling, TCP/IP, Network Architecture, Computer Networking, Network Protocols, General Networking, Cybersecurity, Network Infrastructure, Local Area Networks, Network Analysis, OSI Models, Network Routing, Networking Hardware, Network Switches

  • Status: New

    Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)