• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Attack

Results for "cyber attack"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Planning, Auditing and Maintaining Enterprise Systems

    Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Enterprise Application Management, Security Management, IT Management, System Monitoring, System Implementation, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Information Systems Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    231 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Leadership

    Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership

    4.4
    Rating, 4.4 out of 5 stars
    ·
    87 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Tools and Technologies

    Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    196 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows

    4.5
    Rating, 4.5 out of 5 stars
    ·
    94 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free
    Free
    C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    75 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    A

    Alibaba Cloud Academy

    Protecting Cloud Architecture with Alibaba Cloud

    Skills you'll gain: Cloud Security, Network Security, General Networking, Network Architecture, Data Security, Application Security, Cloud Computing, Operating Systems, Cloud Platforms, Linux, Security Management, Distributed Denial-Of-Service (DDoS) Attacks

    4.7
    Rating, 4.7 out of 5 stars
    ·
    62 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Information Security Foundations

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Detection, Cryptography, Data Security, Continuous Monitoring, Security Management, Compliance Management, Zero Trust Network Access, Information Assurance, Vulnerability Management, Governance Risk Management and Compliance, Data Encryption Standard, Blockchain, Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    22 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Securing AI and Advanced Topics

    Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    230 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Information Systems Auditing and Governance

    Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Management Framework, Continuous Monitoring, Compliance Auditing, Project Coordination, Financial Controls, Quality Assurance, Information Systems Security, Cyber Security Assessment, Fraud detection, Governance, Presentations

    4.6
    Rating, 4.6 out of 5 stars
    ·
    29 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Pentesting Fundamentals for Beginners

    Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 3 - 6 Months

Searches related to cyber attack

cyber attack countermeasures
introduction to cyber attacks
cyber threats and attack vectors
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…252627…50

In summary, here are 10 of our most popular cyber attack courses

  • Planning, Auditing and Maintaining Enterprise Systems: University of Colorado System
  • Leadership: Infosec
  • Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
  • Cybersecurity Tools and Technologies: Microsoft
  • Execution, persistence, privilege escalation and evasion: Infosec
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera
  • Protecting Cloud Architecture with Alibaba Cloud: Alibaba Cloud Academy
  • Information Security Foundations: LearnKartS
  • Securing AI and Advanced Topics: Johns Hopkins University
  • Kali Linux: Board Infinity

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok