• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Model Attack Methods

Results for "model+attack+methods"


  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Secure Against Network Intrusions

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Computer Security Incident Management, Vulnerability Management, Exploitation techniques

    4.9
    Rating, 4.9 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Machine Learning Operations with Vertex AI: Model Evaluation

    Skills you'll gain: Model Evaluation, MLOps (Machine Learning Operations), Generative AI, Continuous Monitoring, Model Optimization, Responsible AI

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    DDoS Attacks and Defenses

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Security, Security Testing, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Routing Protocols, Network Routing, Proxy Servers, Linux, Internet Of Things

    4.5
    Rating, 4.5 out of 5 stars
    ·
    174 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Web and AI Systems

    Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Data Security, LLM Application, Cyber Attacks, Security Awareness, Large Language Modeling, Generative AI Agents

    Build toward a degree

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: AI Security, Threat Modeling, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Code Review, Risk Management Framework

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Threat Analysis

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Intrusion Detection and Prevention, Event Monitoring, Computer Security Incident Management, Malware Protection, Network Analysis, Anomaly Detection, Network Security, Network Monitoring, Network Protocols

    4.9
    Rating, 4.9 out of 5 stars
    ·
    34 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Secure AI: Threat Model & Test Endpoints

    Skills you'll gain: Threat Modeling, AI Security, DevSecOps, Security Testing, Continuous Monitoring, CI/CD, Threat Detection, DevOps, Continuous Integration, Test Script Development, API Testing, Endpoint Security, Scripting, Unit Testing, Scripting Languages, Exploitation techniques, Integration Testing, Data Validation

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Network Attacks, Web Hacking, and Cryptography

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Advanced · Course · 1 - 3 Months

1234…9

In summary, here are 10 of our most popular model+attack+methods courses

  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Secure Against Network Intrusions: Google
  • Machine Learning Operations with Vertex AI: Model Evaluation: Google Cloud
  • DDoS Attacks and Defenses: University of Colorado System
  • Security & Ethical Hacking: Attacking Web and AI Systems: University of Colorado Boulder
  • Evaluate, Create, and Analyze App Security: Coursera
  • Threat Analysis: Cisco Learning and Certifications
  • Secure AI: Threat Model & Test Endpoints: Coursera
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • Identifying Security Vulnerabilities: University of California, Davis

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok