Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
55credentials
1online degree
162courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: Free Trial

    University of California, Irvine

    Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Disaster Recovery, Supplier Management, Security Awareness, Cyber Security Strategy

  • Status: Free Trial

    Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security

  • Status: Free Trial

    Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis

  • Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Threat Modeling, Systems Architecture, Debugging, Computer Architecture, Hardware Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, Linux, Microsoft Windows

  • Status: Free Trial

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Modeling, LLM Application, Generative AI Agents, Application Security, Software Architecture, Systems Architecture, Security Controls, Security Engineering, Interoperability, Agentic systems, Real Time Data, Artificial Intelligence, Network Protocols, Generative AI

  • Status: Free Trial

    Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Risk Mitigation, Security Management, Hardening, Application Security, Infrastructure Security

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Security Information and Event Management (SIEM), TCP/IP, SQL, Relational Databases, Data Security, Cloud Security, Bash (Scripting Language), Debugging, Information Systems Security Assessment Framework (ISSAF)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems

  • Status: Free Trial

    Skills you'll gain: Linux, Cloud-Native Computing, Network Security, Linux Administration, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Network Troubleshooting, Operating System Administration, Cloud Storage, Linux Commands, Software-Defined Networking, User Accounts, Cloud Infrastructure, Network Monitoring, Command-Line Interface, Threat Modeling, Cloud Services, Data Infrastructure