• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Cyber Attack

Results for "cyber attack"


  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    AI Agents for Cybersecurity

    Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    CISSP Domain 1: Security and Risk Management

    Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property

    4.6
    Rating, 4.6 out of 5 stars
    ·
    31 reviews

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Security Operations

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    184 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    System & Network Security Essentials

    Skills you'll gain: Cybersecurity, Malware Protection, Cyber Attacks, Network Security, Information Systems Security, Intrusion Detection and Prevention, Security Testing, Penetration Testing, Firewall, Threat Detection, Internet Of Things, Exploitation techniques, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Campus BBVA

    Cybersecurity for Tech Professionals

    Skills you'll gain: Computer Security Incident Management, Cybersecurity, Cyber Attacks, Incident Management, Security Information and Event Management (SIEM), Fraud detection, Network Security, Security Awareness, Threat Detection, Email Security, Payment Systems, Identity and Access Management, Mobile Security, Authentications

    4.7
    Rating, 4.7 out of 5 stars
    ·
    189 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Security Operations Fundamentals

    Skills you'll gain: DevSecOps, Cyber Threat Intelligence, Endpoint Detection and Response, Cyber Operations, Security Information and Event Management (SIEM), Endpoint Security, Threat Detection, Threat Management, Continuous Monitoring, Cybersecurity, Incident Response, Malware Protection, Automation, Artificial Intelligence

    4.7
    Rating, 4.7 out of 5 stars
    ·
    223 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Practice Project & Questions

    Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving

    4.7
    Rating, 4.7 out of 5 stars
    ·
    63 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and the X-Factor

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    260 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EC-Council

    In the Trenches: Security Operations Center

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection

    4.7
    Rating, 4.7 out of 5 stars
    ·
    54 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Ethical Hacking with Kali Linux

    Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    42 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    T

    The Chinese University of Hong Kong

    Religion and Thought in Modern China: the Song, Jin, and Yuan

    Skills you'll gain: Art History, World History, Cultural Diversity, Anthropology, Sociology, Political Sciences, Education and Training, Economics, Governance

    4.5
    Rating, 4.5 out of 5 stars
    ·
    48 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Managing Network Security

    Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection

    4.8
    Rating, 4.8 out of 5 stars
    ·
    238 reviews

    Beginner · Course · 1 - 3 Months

Searches related to cyber attack

cyber attack countermeasures
introduction to cyber attacks
cyber threats and attack vectors
detecting and mitigating cyber threats and attacks
introduction to cybersecurity tools & cyberattacks
1…222324…50

In summary, here are 10 of our most popular cyber attack courses

  • AI Agents for Cybersecurity : Starweaver
  • CISSP Domain 1: Security and Risk Management: Infosec
  • Security Operations: ISC2
  • System & Network Security Essentials: LearnKartS
  • Cybersecurity for Tech Professionals: Campus BBVA
  • Palo Alto Networks Security Operations Fundamentals: Palo Alto Networks
  • Ethical Hacking Practice Project & Questions: LearnKartS
  • Cybersecurity and the X-Factor: Kennesaw State University
  • In the Trenches: Security Operations Center : EC-Council
  • Ethical Hacking with Kali Linux: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok