All current Threat Intelligence Courses courses in 2024

104 Courses

course image

Threat Modeling for Builders Workshop

Gain invaluable insights into the process of threat modeling with our intermediate-level, six-hour Threat Modeling for Builders Workshop. Perfect for software developers, product managers, systems engineers, and architects, this workshop will introduce you to the essential background of threat modeling, including its importance and utility. Learn t.
provider AWS Skill Builder
sessions On-Demand
course image

Performing Threat Modeling with the Microsoft Threat Modeling Methodology

Title: Performing Threat Modeling with the Microsoft Threat Modeling Methodology Description: Are you tired of discovering security vulnerabilities post-development? Identifying issues late in the process can be both risky and costly. This comprehensive course, provided by Pluralsight and titled "Performing Threat Modeling with the Microsoft Threat.
provider Pluralsight
sessions On-Demand
course image

Threat Modeling with the Microsoft Threat Modeling Tool

Title: Threat Modeling with the Microsoft Threat Tool Description: Dive into the essentials of threat modeling using the Microsoft Threat Modeling Tool in our comprehensive course offered by Pluralsight. This course is designed not only for those looking to enhance the security of their systems but for anyone interested in learning about applicatio.
provider Pluralsight
sessions On-Demand
course image

Threat Modeling the Death Star

Title: Threat Modeling the Death Star Description: Join Mario Areias in an illuminating session titled "Threat Modeling the Death Star". Discover the innovative use of attack trees within the realm of DevOps and explore a dynamic approach to threat modeling that challenges traditional assumptions. This talk aims to shift the narrative from the cumb.
provider Pluralsight
sessions On-Demand
course image

Threat Hunting: Network Hunting

Title: Threat Hunting: Network Hunting Description: Embark on the challenging journey of detecting anomalies and malicious behaviors in network environments with our comprehensive course, Threat Hunting: Network Hunting. This course is designed for individuals tasked with navigating through network traffic to pinpoint harmful activities, even witho.
provider Pluralsight
sessions On-Demand
course image

Implementing Hybrid Threat Solutions with Azure Advanced Threat Protection

Master the essentials of safeguarding your hybrid environment with Microsoft Azure Advanced Threat Protection (ATP) through our comprehensive course. Dive into the expanding world of cybersecurity where threats are continuously evolving, making the adoption of robust and dynamic defensive tools indispensable. Our meticulously designed course on Imp.
provider Pluralsight
sessions On-Demand
course image

Performing Threat Modeling with the OCTAVE Methodology

Discover the essential strategies for safeguarding your organization's critical assets with the "Performing Threat Modeling with the OCTAVE Methodology" course, available now on Pluralsight. This comprehensive course equips you with the tools to identify key assets, assess infrastructure vulnerabilities, and develop a robust protection plan using t.
provider Pluralsight
sessions On-Demand
course image

Threat Modeling: Information Disclosure in Depth

Explore the critical aspect of Information Disclosure within the STRIDE Threat Modeling Framework with our comprehensive course, offered exclusively on LinkedIn Learning. This specialized training is designed to deepen your understanding of how to safeguard the confidentiality of your data, secrets, and other vital information. Whether you're inter.
provider LinkedIn Learning
sessions On-Demand
course image

Threat Modeling: Spoofing In Depth

Title: Threat Modeling: Spoofing In Depth Description: Delve into the crucial topic of spoofing, a prevalent threat targeting modern systems. This course, provided by LinkedIn Learning, thoroughly examines the types of authentication attacks affecting individuals, machines, file systems, and processes. Understand the mechanics behind these attacks.
provider LinkedIn Learning
sessions On-Demand
course image

Threat Modeling: Tampering in Depth

Title: Threat Modeling: Tampering in Depth Description: Delve into the world of cybersecurity with our focused session on tampering threats, led by industry experts from LinkedIn Learning. This comprehensive workshop will cover the nuances of how attackers manipulate systems and tools ranging from debuggers to advanced cloud services. Understand th.
provider LinkedIn Learning
sessions On-Demand
All upcoming courses at Threat Intelligence Courses on the AI ​​Education website. Check out all courses Threat Intelligence Courses and choose the one that's right for you.