In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics.

CFR: Reconnaissance, Attack, and Post-Attack Analysis

CFR: Reconnaissance, Attack, and Post-Attack Analysis
This course is part of CyberSec First Responder (Exam CFR-410) Specialization

Instructor: Bill Rosenthal
Access provided by ExxonMobil
What you'll learn
In this course, you will analyze reconnaissance threats, various attack types, and post-attack types.
Skills you'll gain
- Cloud Security
- Information Systems Security
- Threat Detection
- Network Security
- Cyber Threat Intelligence
- Cybersecurity
- Computer Security
- Threat Management
- Vulnerability Assessments
- Mobile Security
- Exploitation techniques
- Threat Modeling
- Penetration Testing
- Security Engineering
- Malware Protection
- Persistence
- Distributed Denial-Of-Service (DDoS) Attacks
- Cyber Attacks
- Cyber Security Assessment
- Skills section collapsed. Showing 9 of 19 skills.
Details to know

Add to your LinkedIn profile
1 assignment
January 2026
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Before threat actors launch their attack in earnest, they gather information. The information available to them is almost always a result of their target's behavior. The attacker simply does their own research, and suddenly they've made their job a lot easier. You need to analyze just what attackers can learn from your organization to get a better picture of what they'll attack, and how.
What's included
1 reading5 plugins
You've analyzed the general risks and threats to your systems, and you've identified how attackers can gather intelligence on these systems. Now you can begin to analyze the major attacks themselves. There's a wide variety of ways malicious users can compromise your operations, and it's vital you understand the potential effects of each one on the organization.
What's included
9 plugins
After reconnaissance and attack, the last phase of the threat process is post-attack. In many cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want to stay in control of the systems they've compromised, continue to evade any countermeasures, and cover their tracks to avoid being identified. All of this means that, if you prematurely terminate your threat assessment efforts, they'll have gone to waste. Instead, you need to hone your focus on what an attacker does after an attack that can inflict long-lasting harm on your organization.
What's included
7 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






