• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Attack

Results for "cyber attack"


  • Status: Preview
    Preview
    I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    84 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cybersecurity Policy for Water and Electricity Infrastructures

    Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Security Management, NIST 800-53, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk, System Monitoring

    4.6
    Rating, 4.6 out of 5 stars
    ·
    181 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Coursera

    Introduction to Prompt Injection Vulnerabilities

    Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation

    3.7
    Rating, 3.7 out of 5 stars
    ·
    18 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Data Privacy, Ethics, and Responsible AI

    Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Responsible AI, Personally Identifiable Information, Legal Technology, Data Security, Data Ethics, Large Language Modeling, Cybersecurity, Business Ethics, Data Governance, Prompt Engineering, Cyber Attacks, Legal Risk, Data Loss Prevention, Ethical Standards And Conduct, Generative AI, Regulatory Compliance, Risk Analysis, Governance

    4.5
    Rating, 4.5 out of 5 stars
    ·
    100 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Preview
    Preview
    S

    Starweaver

    Introduction to Automotive Cybersecurity & Vehicle Networks

    Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response

    3.5
    Rating, 3.5 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Campus BBVA

    Cybersecurity for Tech Professionals

    Skills you'll gain: Computer Security Incident Management, Cybersecurity, Cyber Attacks, Incident Management, Security Information and Event Management (SIEM), Fraud detection, Network Security, Security Awareness, Threat Detection, Email Security, Payment Systems, Identity and Access Management, Mobile Security, Authentications

    4.7
    Rating, 4.7 out of 5 stars
    ·
    189 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    L&T EduTech

    Digital Technology in Manufacturing

    Skills you'll gain: Product Lifecycle Management, Embedded Systems, Embedded Software, Manufacturing and Production, Manufacturing Processes, Robotic Process Automation, Geometric Dimensioning And Tolerancing, Control Systems, Programmable Logic Controllers, Production Process, Internet Of Things, Manufacturing Operations, Cyber Engineering, Computer-Aided Design, Automation, C (Programming Language), Computer Engineering, Enterprise Resource Planning, Electronic Systems, Digital Transformation

    4.5
    Rating, 4.5 out of 5 stars
    ·
    24 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Security Operations Fundamentals

    Skills you'll gain: DevSecOps, Cyber Threat Intelligence, Endpoint Detection and Response, Cyber Operations, Security Information and Event Management (SIEM), Endpoint Security, Threat Detection, Threat Management, Continuous Monitoring, Cybersecurity, Incident Response, Malware Protection, Automation, Artificial Intelligence

    4.7
    Rating, 4.7 out of 5 stars
    ·
    223 reviews

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    Web Application Security Testing with OWASP ZAP

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications

    4.3
    Rating, 4.3 out of 5 stars
    ·
    289 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and the X-Factor

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    260 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Solutions and Microsoft Defender

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption, Event Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    171 reviews

    Beginner · Course · 1 - 4 Weeks

Searches related to cyber attack

cyber attack countermeasures
introduction to cyber attacks
cyber threats and attack vectors
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…222324…50

In summary, here are 10 of our most popular cyber attack courses

  • Malware Analysis and Introduction to Assembly Language: IBM
  • Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System
  • Introduction to Prompt Injection Vulnerabilities: Coursera
  • Data Privacy, Ethics, and Responsible AI: Coursera
  • Introduction to Automotive Cybersecurity & Vehicle Networks: Starweaver
  • Cybersecurity for Tech Professionals: Campus BBVA
  • Cybersecurity Prevention and Detection: Pearson
  • Digital Technology in Manufacturing: L&T EduTech
  • Palo Alto Networks Security Operations Fundamentals: Palo Alto Networks
  • Web Application Security Testing with OWASP ZAP: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok