Threat Mitigation Courses
Amazon Web Services via AWS Skill Builder Three Stages of Continuous Vulnerability Discovery
HackerOne via YouTube Analyzing Security Threats
Udacity AppSec Threats Deserve Their Own Incident Response Plan
OWASP Foundation via YouTube Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC Based Threats
Black Hat via YouTube Security on the Edge - Safeguarding Smart Homes
DefCamp via YouTube Moving Target Defense - Enhancing Cybersecurity Through Dynamic Systems
DefCamp via YouTube Building and Using the OpenSSF Security Toolbelt - 6 Months In
Linux Foundation via YouTube Insights from Zephyr Security Audit and Vulnerability Experiences
Linux Foundation via YouTube Data Security Champion: Data Exfiltration
Pluralsight