• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Phishing

Results for "phishing"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Cyber Security for Absolute Beginners – Part 1

    Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Computer Security Awareness Training, Security Awareness, Firewall, Information Assurance, Multi-Factor Authentication, Encryption

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials

    Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    18 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Basics of Cyber Threat Intelligence

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Security Controls, Cybersecurity, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Risk Management Framework, Technical Communication, Vulnerability Assessments, Data Integrity, Automation

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity Awareness for Everyone

    Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Threat Intelligence, Cyber Risk, Virtual Private Networks (VPN), Social Media

    4.9
    Rating, 4.9 out of 5 stars
    ·
    58 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Case Studies and Capstone Project

    Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Vulnerability Scanning, Security Awareness, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Malware Protection, Email Security, Network Security, Fraud detection, Artificial Intelligence

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.6K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    IT Security: Defense against the digital dark arts

    Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Computer Security, Application Security, Cybersecurity, Security Awareness, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Wireless Networks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    26K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)

    3.6
    Rating, 3.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    Social Engineering Expert

    Skills you'll gain: Non-Verbal Communication, Exploitation techniques, Human Factors (Security), Investigation, Data Collection, Security Awareness, Persuasive Communication, Social Sciences, Cybersecurity, Rapport Building, Email Security

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    University of London

    Cyber Security Fundamentals

    Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    284 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity Foundation

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence

    4.6
    Rating, 4.6 out of 5 stars
    ·
    540 reviews

    Intermediate · Course · 1 - 3 Months

Searches related to phishing

defending against ai-driven phishing and social engineering
automating response to phishing with cortex xsoar
1234…11

In summary, here are 10 of our most popular phishing courses

  • Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
  • Cyber Security for Absolute Beginners – Part 1: Packt
  • Cyber Security: Essentials: Macquarie University
  • Basics of Cyber Threat Intelligence: Starweaver
  • Cybersecurity Awareness for Everyone: Kennesaw State University
  • Cybersecurity Case Studies and Capstone Project: IBM
  • IT Security: Defense against the digital dark arts : Google
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Social Engineering Expert: Packt
  • Cyber Security: Applied Cryptography: Macquarie University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok