• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Security and Privacy in TOR Network

    Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Cryptographic Protocols, Cybersecurity, Encryption, Security Controls, Proxy Servers, Information Privacy, Servers, Communication Systems, Web Servers, Network Routing, Network Analysis, Cloud Hosting, Cloud Deployment

    4.1
    Rating, 4.1 out of 5 stars
    ·
    36 reviews

    Intermediate · Course · 1 - 4 Weeks

  • E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Security Assessment and Testing

    Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Security Controls

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

    Skills you'll gain: Metasploit, Brute-force attacks, System Configuration, General Networking, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Intrusion Detection and Prevention, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Software Installation, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • 2

    28DIGITAL

    Becoming a Cybersecurity Consultant

    Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Risk Analysis, Data Security, Exploitation techniques, Information Privacy, Vulnerability Assessments, Business Economics

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Advanced Security Strategies and Incident Response

    Skills you'll gain: Incident Response, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Security Controls, Penetration Testing, Mobile Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Advanced · Course · 1 - 3 Months

  • U

    University of Minnesota

    Cloud Data Security

    Skills you'll gain: Cloud Security, Data Security, Cloud Services, Cloud Storage, Personally Identifiable Information, General Data Protection Regulation (GDPR), Information Privacy, Data Management, Data Storage, Data Governance, Data Integrity, Security Controls, Analysis, Authorization (Computing), Health Insurance Portability And Accountability Act (HIPAA) Compliance, Relational Databases, Encryption, SQL

    4.2
    Rating, 4.2 out of 5 stars
    ·
    27 reviews

    Intermediate · Course · 1 - 4 Weeks

  • L

    LearnKartS

    Cybersecurity Governance and Compliance

    Skills you'll gain: Penetration Testing, Cyber Governance, Risk Management, Vendor Management, Governance Risk Management and Compliance, Security Awareness, Cyber Security Strategy, Security Strategy, Business Risk Management, Security Testing, Risk Management Framework, Cyber Security Policies, Security Management, Compliance Management, Supplier Risk Management, Governance, Enterprise Risk Management (ERM), Supplier Management, Cyber Risk, Risk Mitigation

    4.4
    Rating, 4.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Incident Response and Threat Mitigation

    Skills you'll gain: Incident Response, Cyber Threat Intelligence, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Detection, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Cyber Attacks, Cyber Security Assessment, Security Management, Disaster Recovery, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Engineering, Digital Forensics, Security Testing, Cyber Governance, Network Security, Linux

    Intermediate · Course · 1 - 4 Weeks

  • L

    LearnQuest

    Edge Computing Fundamentals

    Skills you'll gain: Cybersecurity, Network Security, Internet Of Things, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Communication Systems, Network Protocols, Infrastructure Architecture, Network Architecture, Network Infrastructure, Data Security, Distributed Computing, Information Privacy, Automation

    Beginner · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Cryptographic Protocols, Exploitation techniques, Security Testing, Encryption, Technical Writing, Test Tools, Human Factors (Security), Technical Communication

    3.9
    Rating, 3.9 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

1…394041…79

In summary, here are 10 of our most popular cyber attacks courses

  • Systems and Application Security: ISC2
  • Security and Privacy in TOR Network: University of Colorado System
  • Ethical Hacking Essentials: Hands-On Edition: EC-Council
  • Security Assessment and Testing: Packt
  • Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
  • Becoming a Cybersecurity Consultant: 28DIGITAL
  • Advanced Security Strategies and Incident Response: Packt
  • Cloud Data Security: University of Minnesota
  • Cybersecurity Governance and Compliance: LearnKartS
  • Incident Response and Threat Mitigation: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok