• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Compliance Framework, Standards & Regulations

    Skills you'll gain: Endpoint Security, Cybersecurity, Compliance Auditing, IT Service Management, Cyber Governance, Regulatory Compliance, Cyber Risk, Encryption, Law, Regulation, and Compliance, Compliance Management, ISO/IEC 27001, Information Technology, Patch Management, User Accounts, Risk Management, Regulatory Requirements, Data Ethics, NIST 800-53, Responsible AI, AI Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Case Studies and Capstone Project

    Skills you'll gain: Incident Response, Computer Security Incident Management, Digital Forensics, Incident Management, Penetration Testing, Security Management, Cyber Security Assessment, Cyber Attacks, Cybersecurity, Threat Management, Vulnerability Assessments, Data Security, Vulnerability Management, Malware Protection, Risk Management Framework, Network Security, Payment Card Industry (PCI) Data Security Standards

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.6K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Digital Forensics Essentials

    Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Technical Communication, Incident Response, Writing, Technical Documentation, Data Analysis Software, File Systems, Artifactory, Microsoft Windows

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cybersecurity for Business

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.8K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Analyze, Create, and Secure Data with Zero Trust

    Skills you'll gain: Investigation, NIST 800-53, Cyber Security Assessment, Personally Identifiable Information, Failure Analysis, Root Cause Analysis

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Cloud Data & Application Security

    Skills you'll gain: Cloud Security, Open Web Application Security Project (OWASP), Data Governance, Data Management, Data Security, Secure Coding, Application Security, DevSecOps, Cloud Applications, Key Management, Encryption, Personally Identifiable Information, Information Privacy, OAuth, Cloud Storage, API Gateway, Threat Modeling, Data Encryption Standard, Risk Management Framework

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Implementing Open Policy Agent for Policy-Driven Control

    Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Open Source Technology, Cross Platform Development, Configuration Management, JSON

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Network Security, Firewall, Cyber Attacks, Data Security, Data Encryption Standard, Penetration Testing, Encryption, Information Assurance, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    589 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Application Security Testing and Debugging

    Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, White-Box Testing, Secure Coding, Vulnerability Management, Technical Communication

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Emerging Telecom Technologies: Edge Security Focus

    Skills you'll gain: Vulnerability Assessments, Network Security, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, Threat Detection, Network Analysis, Continuous Monitoring, Security Strategy, Internet Of Things, Emerging Technologies, General Networking, Network Architecture, Enterprise Architecture, Infrastructure Architecture, Virtualization

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Network Security

    Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    247 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Building Trustworthy AI

    Skills you'll gain: AI Security, Responsible AI, Threat Modeling, DevSecOps, Governance Risk Management and Compliance, Compliance Management, Data Ethics, Data Governance, Model Evaluation, Reinforcement Learning, Risk Management, Prompt Engineering, Governance, Regulatory Compliance, Security Testing, MLOps (Machine Learning Operations), MITRE ATT&CK Framework, Continuous Monitoring, Ethical Standards And Conduct, Vulnerability Assessments

    Intermediate · Specialization · 3 - 6 Months

Searches related to cyber attacks

introduction to cyber attacks
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…192021…60

In summary, here are 10 of our most popular cyber attacks courses

  • Cybersecurity Compliance Framework, Standards & Regulations: IBM
  • Cybersecurity Case Studies and Capstone Project: IBM
  • Digital Forensics Essentials: Starweaver
  • Cybersecurity for Business: University of Colorado System
  • Analyze, Create, and Secure Data with Zero Trust: Coursera
  • Cloud Data & Application Security: LearnKartS
  • Implementing Open Policy Agent for Policy-Driven Control: Coursera
  • Fundamentals of Computer Network Security: University of Colorado System
  • Application Security Testing and Debugging: Starweaver
  • Emerging Telecom Technologies: Edge Security Focus: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok