In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face.

Advanced Cybersecurity Concepts and Capstone Project

Advanced Cybersecurity Concepts and Capstone Project
This course is part of Microsoft Cybersecurity Analyst Professional Certificate

Instructor: Microsoft
Access provided by Abu Dhabi National Oil Company
13,694 already enrolled
95 reviews
Recommended experience
What you'll learn
How to manage and reduce the risk of threats to an organization or system.
How to mitigate common cyber threats using various tools and strategies.
How to develop strategies to protect data and applications from unauthorized access.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
20 assignments
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Microsoft

Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
83.15%
- 4 stars
9.47%
- 3 stars
2.10%
- 2 stars
0%
- 1 star
5.26%
Showing 3 of 95
Reviewed on Nov 19, 2025
Very thorough course; there is a ton of information!
Reviewed on Jan 3, 2025
Excellent course, I enjoyed a lot particularly good material and the videos and reading are well complete.
Explore more from Information Technology

Johns Hopkins University




