• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyber Attacks

Results for "cyber attacks"


  • U

    University of California, Irvine

    Introduction to Cybersecurity & Risk Management

    Skills you'll gain: Threat Modeling, Threat Management, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Business Continuity, Risk Control, Vulnerability Assessments, Security Management, Cyber Risk, Vendor Relationship Management, Compliance Management, Supplier Risk Management, Supplier Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    343 reviews

    Beginner · Specialization · 1 - 3 Months

  • P

    Packt

    Cisco CyberOps Associate (200-201)

    Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Security Controls, Cyber Attacks, Incident Response, Digital Forensics, Risk Management Framework, Exploitation techniques, Network Security, Threat Management, Computer Security Incident Management, Network Monitoring, Event Monitoring, Network Analysis, Firewall, Data Integrity

    5
    Rating, 5 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    24 reviews

    Intermediate · Specialization · 1 - 3 Months

  • I

    ISC2

    Network and Communications Security

    Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, System Configuration, Network Architecture, Intrusion Detection and Prevention

    4.6
    Rating, 4.6 out of 5 stars
    ·
    38 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of California, Irvine

    Data, Security, and Privacy

    Skills you'll gain: digital literacy, Systems Design, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Information Technology, Information Privacy

    4.5
    Rating, 4.5 out of 5 stars
    ·
    53 reviews

    Beginner · Course · 1 - 4 Weeks

  • B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Security Testing, Linux Commands, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    238 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    4.6
    Rating, 4.6 out of 5 stars
    ·
    19 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    Infosec

    Python for Active Defense

    Skills you'll gain: Threat Detection, Cyber Security Strategy, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Scripting, Scripting Languages

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Building Trustworthy AI

    Skills you'll gain: AI Security, Responsible AI, Threat Modeling, Governance Risk Management and Compliance, Compliance Management, Data Ethics, Data Governance, Model Evaluation, Reinforcement Learning, Risk Management, Prompt Engineering, Governance, Regulatory Compliance, Security Testing, MLOps (Machine Learning Operations), MITRE ATT&CK Framework, Continuous Monitoring, Ethical Standards And Conduct, Large Language Modeling, Vulnerability Assessments

    3.5
    Rating, 3.5 out of 5 stars
    ·
    13 reviews

    Intermediate · Specialization · 3 - 6 Months

  • R

    Rice University

    Fundamentals of Immunology: Inflammation, Tolerance, Autoimmunity

    Skills you'll gain: Immunology, Pharmacology, Infectious Diseases, Chronic Diseases, Physiology, Hematology, Preventative Care, Blood Banking, Pathology, Laboratory Testing, Molecular Biology, Diagnostic Tests, Molecular, Cellular, and Microbiology, Cell Biology, Biochemistry

    4.8
    Rating, 4.8 out of 5 stars
    ·
    332 reviews

    Intermediate · Course · 1 - 3 Months

  • T

    Technical University of Munich (TUM)

    Digitalisation in Space Research

    Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Manufacturing Processes, Manufacturing and Production, Geospatial Information and Technology, Image Analysis, AI literacy, digital literacy, Cybersecurity, Spatial Data Analysis, Artificial Intelligence, Cyber Risk, Cyber Attacks, Cloud Computing, Data Storage

    4.8
    Rating, 4.8 out of 5 stars
    ·
    105 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    Infosec

    NIST DoD RMF

    Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Cyber Security Assessment, Information Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    54 reviews

    Mixed · Course · 1 - 3 Months

1…343536…79

In summary, here are 10 of our most popular cyber attacks courses

  • Introduction to Cybersecurity & Risk Management: University of California, Irvine
  • Cisco CyberOps Associate (200-201): Packt
  • Certified Ethical Hacker (CEH): Pearson
  • Network and Communications Security : ISC2
  • Data, Security, and Privacy: University of California, Irvine
  • Kali Linux: Board Infinity
  • Security and Ethical Hacking: University of Colorado Boulder
  • Python for Active Defense: Infosec
  • Building Trustworthy AI: Coursera
  • Fundamentals of Immunology: Inflammation, Tolerance, Autoimmunity: Rice University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok