• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • M

    Microsoft

    Manage Security Operations

    Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Threat Management, Application Performance Management, Cyber Security Policies, Event Monitoring, Brute-force attacks, Incident Response, Query Languages, Interactive Data Visualization

    4.6
    Rating, 4.6 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Security and Privacy in TOR Network

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Cryptographic Protocols, Cybersecurity, Encryption, Security Controls, Proxy Servers, Information Privacy, Servers, Communication Systems, Web Servers, Network Routing, Network Analysis, Cloud Hosting, Cloud Deployment

    4.1
    Rating, 4.1 out of 5 stars
    ·
    36 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Web and AI Systems

    Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Data Security, LLM Application, Cyber Attacks, Security Awareness, Large Language Modeling, Generative AI Agents

    Build toward a degree

    Advanced · Course · 1 - 4 Weeks

  • P

    Packt

    Certified Information Security Manager (CISM)

    Skills you'll gain: Security Management, Incident Response, Vulnerability Assessments, Computer Security Incident Management, Threat Management, IT Management, Vulnerability Management, Security Strategy, Cyber Governance, Risk Management Framework, Cyber Security Strategy, Cyber Security Policies, Information Assurance, Security Controls, Cyber Risk, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    30 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Metasploit for Beginners: Ethical Penetration Testing

    Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Vulnerability Management, Security Testing, Cybersecurity, Linux, Technical Documentation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    72 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • G

    Google

    Google サイバーセキュリティ

    Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Cyber Attacks, Bash (Scripting Language), Incident Management, Data Security, Security Management, Debugging

    4.7
    Rating, 4.7 out of 5 stars
    ·
    240 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • A

    Arizona State University

    Digital Safety and Security

    Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Application Security, Security Software, Computer Security Awareness Training, Cyber Security Strategy, Information Systems Security, Cyber Security Assessment, Security Controls, Disaster Recovery, Data Loss Prevention, Incident Response, Data Storage, Vulnerability Assessments, Patch Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    73 reviews

    Mixed · Course · 1 - 3 Months

  • T

    Technical University of Munich (TUM)

    Digitalisation in Space Research

    Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Manufacturing Processes, Manufacturing and Production, Geospatial Information and Technology, Image Analysis, AI literacy, digital literacy, Cybersecurity, Spatial Data Analysis, Artificial Intelligence, Cyber Risk, Cyber Attacks, Cloud Computing, Data Storage

    4.8
    Rating, 4.8 out of 5 stars
    ·
    105 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of California, Irvine

    Data, Security, and Privacy

    Skills you'll gain: digital literacy, Systems Design, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Information Technology, Information Privacy

    4.5
    Rating, 4.5 out of 5 stars
    ·
    53 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    Infosec

    Cybersecurity Policy Foundations

    Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Command-Line Interface

    4.6
    Rating, 4.6 out of 5 stars
    ·
    124 reviews

    Mixed · Course · 1 - 4 Weeks

  • B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Security Testing, Linux Commands, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    238 reviews

    Intermediate · Course · 1 - 4 Weeks

  • L

    Liberty Mutual Insurance

    Insurance Product Knowledge

    Skills you'll gain: Workers Compensation, Insurance Policies, Insurance, Product Knowledge, Cyber Risk, Product Lining, Cyber Attacks, Law, Regulation, and Compliance, Risk Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    10 reviews

    Beginner · Course · 1 - 4 Weeks

1…383940…79

In summary, here are 10 of our most popular cyber attacks courses

  • Manage Security Operations: Microsoft
  • Security and Privacy in TOR Network: University of Colorado System
  • Security & Ethical Hacking: Attacking Web and AI Systems: University of Colorado Boulder
  • Certified Information Security Manager (CISM): Packt
  • Metasploit for Beginners: Ethical Penetration Testing: Coursera
  • Google サイバーセキュリティ: Google
  • Digital Safety and Security: Arizona State University
  • Digitalisation in Space Research: Technical University of Munich (TUM)
  • Data, Security, and Privacy: University of California, Irvine
  • Cybersecurity Policy Foundations: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok