Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
55credentials
1online degree
162courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Status: Free Trial

    Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Risk Mitigation, Security Management, Hardening, Application Security, Infrastructure Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Status: Preview

    Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting

  • Status: Free Trial

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy

  • Status: Preview

    Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning

  • Status: Free Trial

    Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Incident Response, Query Languages, Interactive Data Visualization

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

  • Status: Free Trial

    University of Colorado Boulder

    Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Authorization (Computing), Cryptography, Human Factors (Security), Security Controls, Security Awareness, Information Privacy, Threat Modeling, Computer Security Incident Management, Risk Analysis, Technical Communication, Problem Solving, Communication

  • Status: Free Trial

    Skills you'll gain: Blockchain, Key Management, Threat Modeling, Application Security, Computer Security, Public Key Infrastructure, Security Controls, Cryptography, Cybersecurity, Network Security, Information Systems Security, Data Security, Security Engineering, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Infrastructure Security, Encryption, Security Testing, Solution Design

  • Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Software, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments, Configuration Management

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • LearnQuest
  • Infosec
  • Macquarie University
  • University of Colorado System
  • IBM