Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
50credentials
1online degree
146courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications

  • Status: Free Trial

    University of Colorado Boulder

    Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Security Awareness, Threat Modeling, Risk Analysis, Problem Solving, Communication

  • Status: Free Trial

    Skills you'll gain: Blockchain, Interoperability, Network Architecture, Solution Architecture, Information Technology Architecture, Enterprise Architecture, Cryptography, Identity and Access Management, Emerging Technologies, Encryption, Threat Modeling, Systems Integration, Information Privacy, Scalability, Security Testing, Requirements Analysis, Prototyping

  • Status: Preview

    Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)

  • Status: Free Trial

    Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking

  • Status: New
    Status: Free Trial

    Skills you'll gain: TCP/IP, Network Administration, Virtual Local Area Network (VLAN), Network Routers, Network Routing, General Networking, Network Architecture, Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Local Area Networks, Computer Networking, Command-Line Interface, Network Infrastructure, Wireless Networks, Network Security, Security Awareness, Threat Modeling, Network Protocols, Network Troubleshooting

  • Status: Free Trial

    Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Application Performance Management, Event Monitoring, Vulnerability Management, Incident Response, Query Languages

  • Status: Preview

    Skills you'll gain: DevSecOps, DevOps, Application Security, Secure Coding, Security Testing, Continuous Delivery, CI/CD, Security Engineering, Continuous Integration, Threat Modeling, Containerization, Continuous Monitoring, Infrastructure as Code (IaC), Automation

What brings you to Coursera today?

Leading partners

  • Packt
  • Pearson
  • Google Cloud
  • LearnQuest
  • Infosec
  • Macquarie University
  • University of Colorado System
  • IBM