• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • Status: Free Trial
    Free Trial
    I

    ISC2

    Access Control Concepts

    Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications

    4.8
    Rating, 4.8 out of 5 stars
    ·
    159 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and Mobility

    Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    638 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EIT Digital

    Embedded Hardware and Operating Systems

    Skills you'll gain: Embedded Software, Real-Time Operating Systems, Embedded Systems, Internet Of Things, Operating Systems, Computer Systems, Application Design, Hardware Architecture, Wireless Networks, Communication Systems, C (Programming Language), Simulations, Application Programming Interface (API)

    4.1
    Rating, 4.1 out of 5 stars
    ·
    627 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Microsoft Azure Security Engineer Associate (AZ-500)

    Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security

    4.5
    Rating, 4.5 out of 5 stars
    ·
    137 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Security Management and Governance

    Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors

    4.8
    Rating, 4.8 out of 5 stars
    ·
    37 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    F

    Fortinet, Inc.

    Fortinet Network Security

    Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Network Administration, Security Information and Event Management (SIEM), Security Engineering, Network Performance Management, Enterprise Security, Network Architecture, Lightweight Directory Access Protocols, Application Security, Cybersecurity, Computer Security, Cyber Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    125 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Practice Project & Questions

    Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving

    4.7
    Rating, 4.7 out of 5 stars
    ·
    63 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EC-Council

    Information Security Analyst

    Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Threat Detection, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Network Monitoring, Vulnerability Assessments, Cloud Security, Malware Protection, Mobile Security, Identity and Access Management, Risk Analysis, Internet Of Things, Web Applications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    37 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: Preview
    Preview
    I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    84 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Networking in Google Cloud

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Load Balancing, Prompt Engineering, Kubernetes, Network Monitoring, Containerization, Network Architecture, Network Security, Cloud Storage, Cloud Services, Identity and Access Management, Application Deployment, Virtual Machines, Network Routing, Network Planning And Design, Virtual Private Networks (VPN), Cloud Computing, Hybrid Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2K reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)

    4
    Rating, 4 out of 5 stars
    ·
    277 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Data Privacy, Ethics, and Responsible AI

    Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Responsible AI, Personally Identifiable Information, Legal Technology, Data Security, Data Ethics, Large Language Modeling, Cybersecurity, Business Ethics, Data Governance, Prompt Engineering, Cyber Attacks, Legal Risk, Data Loss Prevention, Ethical Standards And Conduct, Generative AI, Regulatory Compliance, Risk Analysis, Governance

    4.5
    Rating, 4.5 out of 5 stars
    ·
    100 reviews

    Beginner · Specialization · 1 - 3 Months

Searches related to cyber attacks

introduction to cyber attacks
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…212223…55

In summary, here are 10 of our most popular cyber attacks courses

  • Access Control Concepts: ISC2
  • Cybersecurity and Mobility: Kennesaw State University
  • Embedded Hardware and Operating Systems: EIT Digital
  • Microsoft Azure Security Engineer Associate (AZ-500): Microsoft
  • Security Management and Governance: Royal Holloway, University of London
  • Fortinet Network Security: Fortinet, Inc.
  • Ethical Hacking Practice Project & Questions: LearnKartS
  • Information Security Analyst: EC-Council
  • Malware Analysis and Introduction to Assembly Language: IBM
  • Networking in Google Cloud: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok