Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
55credentials
1online degree
154courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: New

    Skills you'll gain: LLM Application, Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Secure Coding, Security Controls, Security Software, Security Information and Event Management (SIEM), Application Programming Interface (API), System Configuration

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Open Web Application Security Project (OWASP), Technical Design, Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Engineering, Software Development Life Cycle

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems

  • Status: Free Trial

    Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Malware Protection, Email Security, Exploitation techniques, Network Security, Fraud detection, Artificial Intelligence

  • University of Maryland, College Park

    Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security, Threat Modeling, Infrastructure Security, Telecommunications, Threat Detection, Enterprise Security, Security Awareness, General Networking, Data Security, Vulnerability, Public Safety and National Security, Governance

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, System Monitoring, Network Analysis, Linux

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis

  • Status: Free Trial

    Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Threat Management, Security Controls, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL

  • Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Risk Mitigation, Cybersecurity, Threat Modeling, Operational Risk, Vulnerability Assessments, Security Controls, Information Technology

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • LearnQuest
  • Infosec
  • Macquarie University
  • University of Colorado System
  • IBM