• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • Status: Free Trial
    Free Trial
    P

    Packt

    Introduction to Ethical Hacking and Recon Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EIT Digital

    Web Connectivity and Security in Embedded Systems

    Skills you'll gain: Cryptography, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models

    4.4
    Rating, 4.4 out of 5 stars
    ·
    171 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity Risk Management Frameworks

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

    4.7
    Rating, 4.7 out of 5 stars
    ·
    198 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    A

    Amazon Web Services

    AWS Security Governance at Scale

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Solutions and Microsoft Defender

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption, Event Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    171 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Campus BBVA

    Data & Cybersecurity

    Skills you'll gain: Computer Security Incident Management, Security Management, Cyber Risk, Data Security, Security Information and Event Management (SIEM), Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Security Strategy, Incident Management, Security Awareness, Threat Detection, Data Processing, Event Monitoring, Network Security, Data Science, Anomaly Detection, Encryption, Time Series Analysis and Forecasting

    4.7
    Rating, 4.7 out of 5 stars
    ·
    324 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Design and Analyze Secure Networked Systems

    Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments

    3.9
    Rating, 3.9 out of 5 stars
    ·
    233 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Security Governance & Compliance

    Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    175 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Digital Forensics Essentials (DFE)

    Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Threat Detection, Network Security, Data Integrity, Data Storage, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems

    4.7
    Rating, 4.7 out of 5 stars
    ·
    179 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    C

    Campus BBVA

    Cybersecurity for Managers

    Skills you'll gain: Incident Response, Security Management, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Data Security, Email Security, Mobile Security, Business Process, Authentications, Fraud detection, Identity and Access Management, Multi-Factor Authentication, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    487 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Fundamentals

    Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Security Assessment, Network Security, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Vulnerability Assessments, Application Security, Intrusion Detection and Prevention, Security Awareness, Web Servers

    4.6
    Rating, 4.6 out of 5 stars
    ·
    193 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to cyber attacks

introduction to cyber attacks
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…192021…55

In summary, here are 10 of our most popular cyber attacks courses

  • Introduction to Ethical Hacking and Recon Techniques: Packt
  • Web Connectivity and Security in Embedded Systems: EIT Digital
  • Cybersecurity Risk Management Frameworks: Kennesaw State University
  • AWS Security Governance at Scale: Amazon Web Services
  • Cybersecurity Solutions and Microsoft Defender: Microsoft
  • Data & Cybersecurity: Campus BBVA
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Design and Analyze Secure Networked Systems: University of Colorado System
  • Security Governance & Compliance: University of California, Irvine
  • Digital Forensics Essentials (DFE): EC-Council

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok