Cyber Operations

Cyber Operations is a strategic, tactical and operational approach to secure information systems, networks, and digital infrastructure. Coursera's Cyber Operations catalogue teaches you about the fundamental principles of cyber operations, including offensive, defensive, and exploitative tactics. You will learn about network defense strategies, intrusion detection, malware analysis, digital forensics, penetration testing, and secure software development. Additionally, you will understand the legal and ethical issues related to cyber operations and how to respond to and recover from cyber incidents. This skillset will equip you to protect and defend digital assets and data in various sectors, from finance and healthcare to national security.
12credentials
40courses

Results for "cyber operations"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, General Data Protection Regulation (GDPR), Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science

  • Status: New
    Status: Preview

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, Threat Detection, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Network Security, Generative AI

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Security Awareness, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Culture Transformation, Cyber Security Policies, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Operations, Cyber Security Assessment

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control

  • Status: New
    Status: Free Trial

    Macquarie University

    Skills you'll gain: Cyber Governance, Security Awareness, Law, Regulation, and Compliance, Security Strategy, Human Factors (Security), Culture Transformation, Cyber Attacks, Mobile Security, Cyber Risk, Enterprise Security, Data Ethics, Cyber Security Strategy, Cybersecurity, Strategic Leadership, Cyber Operations, Leadership and Management, Leadership, Organizational Leadership, Leadership Development, Team Leadership

  • Status: New
    Status: Preview

    Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies

What brings you to Coursera today?

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Cybersecurity, Computer Security Incident Management, Cyber Threat Intelligence, Security Controls, Threat Management, Business Risk Management, Cyber Attacks, Cyber Operations, Threat Detection, Cloud Security, Risk Management, Cyber Governance, Security Strategy, Security Awareness, Vulnerability, Governance Risk Management and Compliance, Vulnerability Scanning, Vulnerability Assessments

  • Status: New

    Skills you'll gain: Endpoint Detection and Response, Threat Management, Cyber Operations, Security Management, Threat Detection, Information Technology Operations, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Automation, Data Integration

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Attacks, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Data Security, Cloud Storage, Google Cloud Platform, Cybersecurity

  • Status: New

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption