Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
50credentials
1online degree
146courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: Free Trial

    New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies

  • Skills you'll gain: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication

  • Status: New

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Threat Modeling, Incident Response, Cybersecurity, Intrusion Detection and Prevention, Google Gemini, Vulnerability Management, Infrastructure Security, Cloud Security, Interactive Data Visualization, AI Product Strategy, Technical Analysis

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Detection, Internet Of Things, Network Security, Information Systems Security, Infrastructure Security, Security Controls, Data Security, Vulnerability Assessments, Risk Management Framework, Cryptography, Encryption, Cloud Computing

  • Status: New
    Status: Free Trial

    Skills you'll gain: DevSecOps, Microsoft Azure, Zero Trust Network Access, Cloud Security, Threat Modeling, Cloud Computing Architecture, Security Strategy, Cybersecurity, Enterprise Security, Continuous Monitoring, Identity and Access Management, Disaster Recovery

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems

  • Status: New

    Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Risk Analysis, Risk Modeling, Threat Modeling, Business Risk Management, Compliance Management, Incident Response, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis

  • Status: Preview

    Skills you'll gain: Multi-Cloud, Cloud Computing Architecture, Cloud Computing, Cloud Services, Terraform, Kubernetes, Cloud Infrastructure, Application Deployment, Cloud Platforms, Cloud-Native Computing, Containerization, Hybrid Cloud Computing, Microsoft Azure, Infrastructure as Code (IaC), Amazon Web Services, Threat Modeling

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

What brings you to Coursera today?

Leading partners

  • Packt
  • Pearson
  • Google Cloud
  • LearnQuest
  • Infosec
  • Macquarie University
  • University of Colorado System
  • IBM