Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.

Detecting and Mitigating Cyber Threats and Attacks

Detecting and Mitigating Cyber Threats and Attacks
This course is part of Cybersecurity for Business Specialization

Instructor: Greg Williams
Access provided by Ross Strategic
23,922 already enrolled
458 reviews
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 5 modules in this course
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
79.03%
- 4 stars
17.90%
- 3 stars
1.96%
- 2 stars
0.43%
- 1 star
0.65%
Showing 3 of 458
Reviewed on May 23, 2019
Awesome and great course for those who had interest in cyber security analysis. Recommended.
Reviewed on Oct 30, 2020
exceptional and fantastic way to teach. makes it east to learn a lot w/o any issues.
Reviewed on Sep 20, 2020
Great! Helped me understand the basics and propelled me to learn more about Security Controls and Threats
Explore more from Information Technology
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.





