Cyber Attacks

Cyber Security is the practice of protecting systems, networks, and software from digital attacks. Coursera's Cyber Security catalogue teaches you the fundamental knowledge of this crucial field, starting from understanding threats and vulnerabilities to implementing measures to mitigate risks. You'll learn about various aspects of information security and cyber security such as network security, application security, data protection, identity and access management, incident response, and risk management. This skillset will empower you to protect and sustain systems, ward off cyber threats, and ensure business continuity in the digital world. Whether you're an IT professional, a system administrator, or someone interested in safeguarding digital assets, you will acquire the skills to thwart cyber threats and ensure digital safety.
33credentials
96courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "cyber attacks"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers

  • Status: Free Trial

    Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication

  • Status: New
    Status: Free Trial

    Coursera Instructor Network

    Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Responsible AI, Personally Identifiable Information, Legal Technology, Data Security, Data Ethics, Large Language Modeling, Cybersecurity, Business Ethics, Data Governance, Prompt Engineering, Cyber Attacks, Legal Risk, Data Loss Prevention, Ethical Standards And Conduct, Generative AI, Regulatory Compliance, Risk Analysis, Governance

  • Status: Free Trial

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

  • Status: Preview

    Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response

  • Status: Free Trial

    University of Colorado Boulder

    Skills you'll gain: Data Ethics, Data Visualization Software, Interactive Data Visualization, Visualization (Computer Graphics), Data Security, Data Presentation, User Centered Design, Cybersecurity, User Experience Design, Technical Communication, Healthcare Ethics, Cyber Attacks, Usability, Statistical Reporting, Human Centered Design, Data Storytelling, Ethical Standards And Conduct, Responsible AI, Information Privacy, Analysis

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service

  • Status: Free Trial

    Kennesaw State University

    Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Cyber Security Policies, Security Management, Firewall, Computer Security Incident Management, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management

  • Status: Free Trial

    Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers

  • Status: Preview

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

  • Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Scenario Testing, Virtual Machines, Event Management