• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • E

    EDUCBA

    Building DApps In Ethereum Blockchain

    Skills you'll gain: Blockchain, Secure Coding, Penetration Testing, Front-End Web Development, Application Development, Security Testing, Web Development Tools, Application Security, Event Monitoring, Development Environment, Exploit development, Frontend Integration, Web Development, Software Development Tools, Cyber Security Assessment, Payment Systems, Transaction Processing, Authorization (Computing), Token Optimization, Role-Based Access Control (RBAC)

    ★ 4.9 (143) · Beginner · Specialization · 3 - 6 Months

  • G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Cyber Attacks, Multi-Factor Authentication, Data Governance, Key Management, Security Management, Authorization (Computing), Containerization, Network Analysis

    ★ 4.4 (47) · Beginner · Course · 1 - 4 Weeks

  • 2

    28DIGITAL

    Security and Privacy for Big Data - Part 1

    Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk

    ★ 4.7 (587) · Beginner · Course · 1 - 4 Weeks

  • M

    Microsoft

    Manage Security Operations

    Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Security Controls, Threat Detection, Threat Management, Application Performance Management, Cyber Security Policies, Event Monitoring, Brute-force attacks, Incident Response, Query Languages, Interactive Data Visualization

    ★ 4.6 (12) · Intermediate · Course · 1 - 4 Weeks

  • A

    Akamai Technologies, Inc.

    Introduction to IT Security

    Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management

    ★ 4.9 (30) · Beginner · Course · 1 - 3 Months

  • I

    Infosec

    NIST CSF

    Skills you'll gain: Cyber Risk, Risk Management Framework, Cybersecurity, Continuous Monitoring, Cyber Governance, Cyber Security Strategy, Security Management, Infrastructure Security, Cyber Security Assessment, Cyber Security Policies, Incident Response, Security Controls, Information Privacy

    ★ 4.3 (156) · Mixed · Course · 1 - 3 Months

  • U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    ★ 4.6 (19) · Intermediate · Specialization · 3 - 6 Months

  • P

    Pearson

    Cisco Certified Support Technician IT Support - 100-140

    Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Peripheral Devices, Personally Identifiable Information, Remote Access Systems, Hardware Troubleshooting, Threat Detection, Desktop Support, Technical Support and Services, Threat Management, Help Desk Support, Cyber Attacks, Cloud Services, Active Directory, Cybersecurity, Mac OS, Computer Hardware, Microsoft Windows, IT Management, Cloud Security

    ★ 4.7 (20) · Beginner · Specialization · 1 - 3 Months

  • F

    Fortinet, Inc.

    FortiGate Administrator

    Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Routing Protocols, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Remote Access Systems, Network Security, Network Administration, Virtual Networking, Cyber Security Policies, Security Controls, User Accounts, System Configuration, Network Monitoring

    ★ 4.7 (96) · Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Security and Risk Management

    Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Information Systems Security, Risk Management, Law, Regulation, and Compliance, Risk Analysis, Risk Management Framework, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, NIST 800-53

    ★ 4.8 (76) · Beginner · Course · 1 - 4 Weeks

  • T

    The University of Sydney

    Blockchain Scalability and its Foundations in Distributed Systems

    Skills you'll gain: Blockchain, Distributed Computing, Network Security, Scalability, Cryptography, Data Integrity, Transaction Processing, Algorithms

    ★ 4.5 (120) · Beginner · Course · 1 - 3 Months

  • Q

    Queen Mary University of London

    Cloud Computing Law: Transactions

    Skills you'll gain: Cloud Deployment, Cloud Services, Legal Risk, Cloud Computing, Intellectual Property, Cloud Computing Architecture, Cloud Storage, Cloud Platforms, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Contract Review, Law, Regulation, and Compliance, Contract Management, Data Security, Data Governance, Negotiation, Regulatory Requirements, Cybersecurity

    ★ 4.9 (102) · Beginner · Course · 1 - 4 Weeks

1…333435…79

In summary, here are 10 of our most popular cyber attacks courses

  • Building DApps In Ethereum Blockchain: EDUCBA
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
  • Security and Privacy for Big Data - Part 1: 28DIGITAL
  • Manage Security Operations: Microsoft
  • Introduction to IT Security: Akamai Technologies, Inc.
  • NIST CSF: Infosec
  • Security and Ethical Hacking: University of Colorado Boulder
  • Cisco Certified Support Technician IT Support - 100-140: Pearson
  • FortiGate Administrator: Fortinet, Inc.
  • Security and Risk Management: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok