Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Counterterrorism Course Catalog
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, World History, International Relations, Political Sciences, Public Policies, Trend Analysis, Psychology
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Continuous Monitoring, NIST 800-53, Security Management, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Intelligence Collection and Analysis, Surveys, Survey Creation, Environmental Laws, Environment, Sampling (Statistics), Political Sciences, Economic Development, International Relations, Cybersecurity, Immigration Law, Public Safety and National Security, Socioeconomics, Governance, Mitigation, Social Studies, Social Sciences, Security Strategy, Conflict Management
- Status: New
Skills you'll gain: Incident Response, Email Security, Cloud Security, Computer Security Incident Management, Threat Management, Vulnerability Management, Risk Management Framework, Incident Management, Malware Protection, Security Management, Information Systems Security, Network Security, Vulnerability Assessments, Cybersecurity, Threat Detection, Information Assurance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Cyber Security Policies
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, Business Continuity, Disaster Recovery, IT Management, Information Systems Security, Cybersecurity, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Cyber Security Assessment, Information Assurance, Risk Analysis, Key Performance Indicators (KPIs)
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Security Management, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Disaster Recovery, Malware Protection
University of California, Irvine
Skills you'll gain: Conflict Management, Active Listening, Intercultural Competence, Cultural Diversity, Social Skills, Interpersonal Communications, Communication Strategies, Mediation, De-escalation Techniques, Verbal Communication Skills, Diversity Awareness, Tactfulness, Cultural Sensitivity, Communication, Stakeholder Management, Teamwork, Cooperation, Collaboration, Leadership, Organizational Effectiveness
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Counterterrorism learners also search
In summary, here are 10 of our most popular counterterrorism courses
- Terrorism and Counterterrorism: Comparing Theory and Practice:Â Universiteit Leiden
- Homeland Security and Cybersecurity:Â University of Colorado System
- M.A. in International Relations, Security, and Strategy:Â O.P. Jindal Global University
- Certified Incident Handler (ECIH) v2:Â Packt
- Cybersecurity Leadership and Management:Â Infosec
- Cyber Incident Response:Â Infosec
- Conflict Management:Â University of California, Irvine
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- AI for Cybersecurity:Â Johns Hopkins University
- Python for Cybersecurity:Â Infosec