Cyber Attacks

Sort options

Security Operations Center (SOC) (Coursera)

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you acquire the fundamental skills required in a security operations center. You will learn the primary functions of a security operations center (SOC) and the critical role it plays in protecting [...]

Cyber Threat Hunting (Coursera)

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge [...]

Digital Safety and Security (Coursera)

Trouble can come from anywhere, and that includes the digital world. Digital security skills can come in handy when that trouble does come, like knowing what to do when you see a phishing scam email. Digital safety also means taking measures to protect yourself against cyberattacks so they don’t [...]

Ethical Hacking Essentials (EHE) (Coursera)

Apr 29th 2024
Ethical Hacking Essentials (EHE) (Coursera)
Course Auditing
Categories
Effort
Languages
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, [...]

Digital Forensics Essentials (DFE) (Coursera)

Apr 29th 2024
Digital Forensics Essentials (DFE) (Coursera)
Course Auditing
Categories
Effort
Languages
Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, [...]

Network Security (Coursera)

Apr 29th 2024
Network Security (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals [...]

Introduction to Cybersecurity Essentials (Coursera)

Apr 29th 2024
Introduction to Cybersecurity Essentials (Coursera)
Course Auditing
Categories
Effort
Languages
Build key skills needed to recognize common security threats and risks. Discover the characteristics of cyber-attacks and learn how organizations employ best practices to guard against them. Designed specifically for beginners and those who are interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, [...]

Vulnerabilidades y pruebas de penetración (Coursera)

El curso Vulnerabilidades y pruebas de penetración busca que identifiques los conceptos de detección de vulnerabilidades y amenazas, los fundamentos de los ciberataques y de pruebas de penetración a sistemas. Este curso se desarrolla en cuatro (4) módulos en donde aprenderás a cómo Identificar las vulnerabilidades y amenazas de [...]

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]