Cyber Attacks

Sort options

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]

Detecting and Mitigating Cyber Threats and Attacks (Coursera)

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the [...]

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]

Applied ChatGPT for Cybersecurity (Coursera)

Apr 8th 2024
Applied ChatGPT for Cybersecurity (Coursera)
Course Auditing
Categories
Effort
Languages
There's a lot of talk about good and bad use of ChatGPT, but in this course we will dig into using ChatGPT to do some hands on introductory SOC analyst/incident response work, starting with basic packet analysis and moving to basic reverse engineering of a piece of malware. ChatGPT [...]

Cyber Threat Hunting (Coursera)

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge [...]

Computer Security Support Fundamentals (Coursera)

Mar 25th 2024
Computer Security Support Fundamentals (Coursera)
Course Auditing
Categories
Effort
Languages
This online course can help you decide your career path. The Computer Security Support Fundamentals course is the first step to discovering if a career in cybersecurity is right for you. By the end of this course, you will be able to identify security support roles, manage Windows computers, [...]

Ciberseguridad. Bases y estructuras para la protección de la información (edX)

Self Paced
Ciberseguridad. Bases y estructuras para la protección de la información (edX)
Course Auditing
Categories
Effort
Languages
Sé capaz de blindar tu información y la de tu empresa contra las amenazas informáticas y conoce los fundamentos del fascinante mundo de la ciberseguridad. En la actualidad el acceso a las bases de datos, a las redes de computadoras y la información en la nube es esencial para [...]

Network Security (edX)

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks. In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber [...]