• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyberattacks

Results for "cyberattacks"


  • D

    Dell

    Dell Technologies Technical Customer Support Specialist

    Skills you'll gain: Hardware Troubleshooting, Customer Service, Network Troubleshooting, Customer Relationship Building, Computer Security Incident Management, Incident Response, Professional Development, Continuous Improvement Process, Cybersecurity, Process Improvement, Performance Metric, Desktop Support, Operating Systems, Computer Hardware, Cyber Attacks, Customer experience improvement, Technical Support, Customer Complaint Resolution, Digital Transformation, Lifelong Learning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    48 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • L

    LearnQuest

    Advanced Threat Hunting and Incident Response

    Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Technical Communication, Simulations

    4.4
    Rating, 4.4 out of 5 stars
    ·
    46 reviews

    Advanced · Course · 1 - 4 Weeks

  • M

    Microsoft

    Microsoft Azure Security Tools Specialization

    Skills you'll gain: Penetration Testing, Record Keeping, Security Testing, Data Management, Threat Management, Records Management, Cloud Computing Architecture, Authentications, Data Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    50 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness

    4.7
    Rating, 4.7 out of 5 stars
    ·
    23 reviews

    Intermediate · Specialization · 3 - 6 Months

  • S

    Starweaver

    Introduction to Automotive Cybersecurity & Vehicle Networks

    Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response

    3.3
    Rating, 3.3 out of 5 stars
    ·
    15 reviews

    Beginner · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: Data Security and Information Privacy

    Skills you'll gain: Data Security, Cyber Risk, Cybersecurity, Data Sharing, Cyber Attacks, Security Management, Cryptography, Security Software, Security Strategy, Network Security, Risk Modeling, Data Access, Statistical Methods

    Beginner · Course · 1 - 3 Months

  • P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 1

    Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management

    4.3
    Rating, 4.3 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 4 Weeks

  • L

    LearnKartS

    Ethical Hacking Practice Project & Questions

    Skills you'll gain: Cyber Security Assessment, Security Testing, Threat Detection, Cybersecurity, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Cyber Security Strategy, Cyber Attacks, Problem Solving

    4.7
    Rating, 4.7 out of 5 stars
    ·
    65 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Advanced Security Strategies and Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Advanced · Course · 1 - 3 Months

  • E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things

    Beginner · Course · 1 - 3 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 1

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Operations, Information Systems Security, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploit development, Exploitation techniques, Cyber Attacks, Cyber Security Policies, Computer Security, Security Controls, Data Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

1…111213…19

In summary, here are 10 of our most popular cyberattacks courses

  • Dell Technologies Technical Customer Support Specialist: Dell
  • Advanced Threat Hunting and Incident Response: LearnQuest
  • Microsoft Azure Security Tools Specialization: Microsoft
  • The Complete Ethical Hacking Course: Packt
  • Introduction to Automotive Cybersecurity & Vehicle Networks: Starweaver
  • Cyber Security: Data Security and Information Privacy: Macquarie University
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 1: Pearson
  • Ethical Hacking Practice Project & Questions: LearnKartS
  • Software Security for Web Applications: Codio
  • Advanced Security Strategies and Incident Response: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok