Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Counterterrorism Course Catalog
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, World History, International Relations, Political Sciences, Public Policies, Trend Analysis, Psychology
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Continuous Monitoring, NIST 800-53, Security Management, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Intelligence Collection and Analysis, Surveys, Survey Creation, Environmental Laws, Environment, Sampling (Statistics), Political Sciences, Economic Development, International Relations, Cybersecurity, Immigration Law, Public Safety and National Security, Socioeconomics, Governance, Mitigation, Social Studies, Social Sciences, Security Strategy, Conflict Management
University of California, Irvine
Skills you'll gain: Conflict Management, Active Listening, Intercultural Competence, Cultural Diversity, Social Skills, Interpersonal Communications, Communication Strategies, Mediation, De-escalation Techniques, Verbal Communication Skills, Diversity Awareness, Tactfulness, Cultural Sensitivity, Communication, Stakeholder Management, Teamwork, Cooperation, Collaboration, Leadership, Organizational Effectiveness
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Security Management, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Disaster Recovery, Malware Protection
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, Business Continuity, Disaster Recovery, IT Management, Information Systems Security, Cybersecurity, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Cyber Security Assessment, Information Assurance, Risk Analysis, Key Performance Indicators (KPIs)
- Status: New
Skills you'll gain: Incident Response, Email Security, Cloud Security, Computer Security Incident Management, Threat Management, Vulnerability Management, Risk Management Framework, Incident Management, Malware Protection, Security Management, Information Systems Security, Network Security, Vulnerability Assessments, Cybersecurity, Threat Detection, Information Assurance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Cyber Security Policies
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, TCP/IP, Python Programming, Data Access, User Accounts, System Programming, Automation
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, General Networking, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Terrorism and Counterterrorism: Comparing Theory and Practice:Â Universiteit Leiden
- Homeland Security and Cybersecurity:Â University of Colorado System
- M.A. in International Relations, Security, and Strategy:Â O.P. Jindal Global University
- Conflict Management:Â University of California, Irvine
- Cyber Incident Response:Â Infosec
- Cybersecurity Leadership and Management:Â Infosec
- Certified Incident Handler (ECIH) v2:Â Packt
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- AI for Cybersecurity:Â Johns Hopkins University
- Python for Cybersecurity:Â Infosec