• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Cyber Attack

Results for "cyber attack"


  • Status: Free
    Free
    C

    Coursera

    Analyze Network Traffic with TCPDump: Build a Logging Tool

    Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    P

    Packt

    Information Systems Auditing and Governance

    Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Management Framework, Continuous Monitoring, Compliance Auditing, Project Coordination, Financial Controls, Quality Assurance, Information Systems Security, Cyber Security Assessment, Fraud detection, Governance, Presentations

    4.6
    Rating, 4.6 out of 5 stars
    ·
    29 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    ISC2

    Network and Communications Security

    Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Cisco Certified Support Technician IT Support - 100-140

    Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Peripheral Devices, Personally Identifiable Information, Remote Access Systems, Hardware Troubleshooting, Threat Detection, Desktop Support, Help Desk Support, Cyber Attacks, Network Support, Cloud Services, Cybersecurity, Mac OS, Computer Hardware, Microsoft Windows, Technical Support and Services, Electrical Safety, IT Management, Cloud Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    9 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Vulnerabilidades y pruebas de penetración

    Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    122 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    T

    The Chinese University of Hong Kong

    Intellectual Change in Early China: Warring States and Han

    Skills you'll gain: Culture, Social Sciences, Liberal Arts, World History, Ancient History, Research, Political Sciences, Psychology, Economics, Governance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    124 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    Edureka

    Gen AI in Cybersecurity

    Skills you'll gain: Secure Coding, Generative AI, Intrusion Detection and Prevention, Threat Detection, Responsible AI, Cybersecurity, Application Security, Cyber Threat Intelligence, Network Security, Artificial Intelligence, Anomaly Detection, Incident Response, Data Analysis

    3.7
    Rating, 3.7 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Generative AI and LLM Security

    Skills you'll gain: Responsible AI, Data Ethics, Threat Modeling, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain

    Intermediate · Course · 1 - 3 Months

  • I

    ISC2

    Security Concepts and Practices

    Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    105 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Advanced Cybersecurity Concepts and Capstone Project

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    91 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Network Security and Analysis

    Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    A

    Arizona State University

    Digital Safety and Security

    Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    64 reviews

    Mixed · Course · 1 - 3 Months

Searches related to cyber attack

cyber attack countermeasures
introduction to cyber attacks
cyber threats and attack vectors
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…262728…50

In summary, here are 10 of our most popular cyber attack courses

  • Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera
  • Information Systems Auditing and Governance: Packt
  • Network and Communications Security : ISC2
  • Cisco Certified Support Technician IT Support - 100-140: Pearson
  • Vulnerabilidades y pruebas de penetración: Universidad de los Andes
  • Intellectual Change in Early China: Warring States and Han: The Chinese University of Hong Kong
  • Gen AI in Cybersecurity: Edureka
  • Generative AI and LLM Security : Edureka
  • Security Concepts and Practices: ISC2
  • Advanced Cybersecurity Concepts and Capstone Project: Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok