Threat Modeling

Threat Modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. Coursera's Threat Modeling catalogue teaches you about the principles and techniques used to identify and mitigate potential security threats. You'll learn everything from the process of identifying and assessing potential threats, designing and implementing secure system architectures, to practicing effective threat management strategies. You'll enhance your skills in cybersecurity, risk management, and system defense, crucial for IT professionals, security analysts, or anyone interested in strengthening their understanding of security and threat mitigation.
55credentials
1online degree
162courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat modeling"

  • Skills you'll gain: Responsible AI, Security Strategy, Data Security, Information Systems Security, Threat Modeling, Security Controls, Infrastructure Security, Risk Management Framework, Information Privacy, Artificial Intelligence

  • Skills you'll gain: Safety Assurance, Responsible AI, Security Strategy, Personally Identifiable Information, Data Security, Risk Management, Safety and Security, Business Risk Management, Compliance Management, Threat Modeling, Cybersecurity, Infrastructure Security, Artificial Intelligence

  • Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Network Security, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Authorization (Computing), Data Collection, Data Analysis