Threat Management

Threat Management is a comprehensive approach to assess and confront security risks and vulnerabilities within an organization. Coursera's threat management catalogue educates you on how to identify, evaluate, and address potential threats to prevent damage. You'll learn about different types of threats, from cyberattacks to internal breaches, and the most effective strategies for managing them. You'll also gain a deep understanding of tools and techniques for threat identification and mitigation, risk assessment methodologies, and the creation of an effective threat management plan. This skill is crucial for those in roles such as cybersecurity analyst, IT manager, or any individual responsible for maintaining an organization's security posture.
37credentials
135courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat management"

  • Status: Free Trial

    Skills you'll gain: Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Risk Management, Risk Analysis, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Risk Mitigation

  • Status: Free Trial

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring

  • Status: Free Trial

    Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Threat Management, Application Security, Data Security

  • Status: Preview

    University of London

    Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption

  • Status: Free Trial

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle

  • Status: New

    Skills you'll gain: Cybersecurity, Cyber Governance, Cyber Attacks, Endpoint Security, Threat Detection, Incident Response, Cyber Security Assessment, Malware Protection, Network Security, Security Management, Information Systems Security, Computer Security, Intrusion Detection and Prevention, Threat Management, Firewall, Network Analysis, Encryption

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations

  • Status: Preview

    Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, Cyber Threat Hunting, DevOps, Cyber Threat Intelligence, Security Engineering, Threat Detection, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection

  • Status: Free Trial

    Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity