Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat modeling"
Status: Free TrialGoogle
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL

EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Threat Modeling, Systems Architecture, Debugging, Computer Architecture, Hardware Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, Linux, Microsoft Windows

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Status: Free TrialSkills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
Status: PreviewUniversity of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Status: Free TrialSkills you'll gain: Cryptography, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models
Status: Free TrialSkills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Exploit development, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Encryption, Network Analysis
Status: Free TrialVanderbilt University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Security Controls, Cybersecurity, Law, Regulation, and Compliance, Prompt Engineering, Public Affairs, Artificial Intelligence
Status: NewStatus: PreviewFractal Analytics
Skills you'll gain: Threat Modeling, LLM Application, Generative AI Agents, Application Security, Software Architecture, Systems Architecture, Security Controls, Security Engineering, Interoperability, Agentic systems, Real Time Data, Artificial Intelligence, Network Protocols, Generative AI
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
In summary, here are 10 of our most popular threat modeling courses
- Cybersécurité Google: Google
- Architecting Smart IoT Devices: EIT Digital
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Introduction to Ethical Hacking and Recon Techniques: Packt
- Securing Digital Democracy: University of Michigan
- Web Connectivity and Security in Embedded Systems: EIT Digital
- Python for Command-and-control, Exfiltration and Impact: Infosec
- Generative AI Cybersecurity & Privacy for Leaders: A Primer: Vanderbilt University
- Model Context Protocol (MCP) Mastery: Fractal Analytics
- Software Design Threats and Mitigations: University of Colorado System










