Threat Management

Threat Management is a comprehensive approach to assess and confront security risks and vulnerabilities within an organization. Coursera's threat management catalogue educates you on how to identify, evaluate, and address potential threats to prevent damage. You'll learn about different types of threats, from cyberattacks to internal breaches, and the most effective strategies for managing them. You'll also gain a deep understanding of tools and techniques for threat identification and mitigation, risk assessment methodologies, and the creation of an effective threat management plan. This skill is crucial for those in roles such as cybersecurity analyst, IT manager, or any individual responsible for maintaining an organization's security posture.
36credentials
133courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat management"

  • Status: Free Trial

    Cisco Learning and Certifications

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, System Monitoring, Network Analysis, Linux

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cyber Security Strategy, Governance Risk Management and Compliance, Strategic Decision-Making, Insurance, Compliance Management, Threat Modeling, Business Risk Management, Business Communication

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Continuous Monitoring, Document Management, NIST 800-53

  • Status: New
    Status: Free Trial

    Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Security Testing, Security Engineering, Threat Management, Cybersecurity, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability

  • Status: New

    Skills you'll gain: Endpoint Detection and Response, Threat Management, Cyber Operations, Security Management, Threat Detection, Information Technology Operations, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Automation, Data Integration

  • Status: Free Trial

    Cisco Learning and Certifications

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring

  • Status: Free Trial

    Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Risk Mitigation, Security Management, Hardening, Application Security, Infrastructure Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL

  • Status: Free Trial

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

  • Status: New
    Status: Preview

    Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, Virtual Private Networks (VPN), Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Identity and Access Management, Encryption, Incident Response