• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Cyber Attack

Results for "cyber attack"


  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    Cyber Security Professional – Beginner’s Career Guide

    Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Certified in Cybersecurity

    Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • U

    University of London

    Master of Science in Cyber Security

    Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Network Security, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Authorization (Computing), Malware Protection, Data Collection, Data Analysis

    Earn a degree

    Degree · 1 - 4 Years

  • Status: Preview
    Preview
    U

    University of California, Santa Cruz

    Cyber-Physical Systems: Modeling and Simulation

    Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Control Systems, Network Model, Embedded Systems, Systems Analysis, Technical Design, Computational Logic, Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    53 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Risk Management for Cyber Security Managers

    Skills you'll gain: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Practical Cyber Hacking Skills for Beginners

    Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    IT Audit Field Manual: Strengthen Cyber Defense

    Skills you'll gain: Cyber Security Assessment, Endpoint Security, IT Security Architecture, Information Technology, Data Security, Network Security, Cloud Security, Information Privacy, Firewall, Cybersecurity, Linux, System Configuration, Security Controls, Cyber Threat Intelligence, Cyber Security Strategy, Microsoft Windows, Identity and Access Management, Risk Management Framework, Encryption, Good Clinical Practices (GCP)

    Beginner · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data Security and Information Privacy

    Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Cyber Security Projects for Your Dream Job

    Skills you'll gain: Cybersecurity, ChatGPT, Infrastructure Security, Security Information and Event Management (SIEM), General Networking, Threat Detection, Incident Response, Cloud Security, System Configuration, Automation

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    F

    FAIR Institute

    Foundations of Cyber Risk Management and FAIR™

    Skills you'll gain: Risk Analysis, Cyber Risk, Risk Modeling, Cybersecurity, Governance, Risk Management, Enterprise Risk Management (ERM), Strategic Decision-Making, Business Risk Management, Strategic Prioritization, Compliance Reporting, Management Reporting, Strategic Leadership, Business Communication

    4.5
    Rating, 4.5 out of 5 stars
    ·
    11 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to cyber attack

cyber attack countermeasures
introduction to cyber attacks
cyber threats and attack vectors
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…101112…49

In summary, here are 10 of our most popular cyber attack courses

  • Cyber Secure Coder (CSC-110) : Packt
  • Cyber Security Professional – Beginner’s Career Guide: Packt
  • Certified in Cybersecurity: ISC2
  • Master of Science in Cyber Security: University of London
  • Cyber-Physical Systems: Modeling and Simulation: University of California, Santa Cruz
  • Risk Management for Cyber Security Managers: Packt
  • Practical Cyber Hacking Skills for Beginners: Packt
  • IT Audit Field Manual: Strengthen Cyber Defense: Packt
  • Cyber Security: Identity Access Management and Authentication: Macquarie University
  • Cyber Security: Data Security and Information Privacy: Macquarie University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok