Cyber Threats

Sort options

Cyber Threat Hunting (Coursera)

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge [...]

Ethical Hacking Essentials (EHE) (Coursera)

Apr 29th 2024
Ethical Hacking Essentials (EHE) (Coursera)
Course Auditing
Categories
Effort
Languages
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, [...]

Network Security (Coursera)

Apr 29th 2024
Network Security (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals [...]

Cybersecurity Foundations for Risk Management (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]

Detecting and Mitigating Cyber Threats and Attacks (Coursera)

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the [...]

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]

Fundamentals of Cybersecurity with the TAME Range Training Platform (edX)

Self Paced
Fundamentals of Cybersecurity with the TAME Range Training Platform (edX)
Course Auditing
Categories
Effort
Languages
Our Cybersecurity course, based on the TAME Range Cyber Training Platform, offers students a comprehensive, real-world, hands-on cyber education, ensuring they are well prepared to face the dynamic challenges in the professional field of Cybersecurity.

Industrial Cybersecurity (Coursera)

Apr 22nd 2024
Industrial Cybersecurity (Coursera)
Course Auditing
Categories
Effort
Languages
Explore the field of Industrial Cybersecurity through our dedicated course, where you will explore the complexities of securing industrial systems from cyber threats. Learn the most recent strategies and effective practices to strengthen your defenses and guarantee the robustness of vital [...]