• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Mitm Attacks

Results for "mitm+attacks"


  • J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture

    ★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • D

    DeepLearning.AI

    Red Teaming LLM Applications

    Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, AI Security, Application Security, Risk Management Framework

    ★ 4.8 (58) · Beginner · Project · Less Than 2 Hours

    Category: Free
    Free
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Detect & Respond to Mobile AI Threats

    Skills you'll gain: Mobile Security, AI Security, Exploitation techniques, Threat Detection, Security Controls, Intrusion Detection and Prevention, Threat Modeling, Hardening, AI literacy, Malware Protection, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Prompt Engineering, Human Factors (Security), Incident Response, Information Privacy

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Strategize, Roadmap, and Mitigate AI Projects

    Skills you'll gain: Case Studies, Fraud detection, Project Design, Project Risk Management, Ethical Standards And Conduct, Law, Regulation, and Compliance, Scalability, Content Strategy, Quality Assessment, Keyword Research, Search Engine Optimization, Content Creation

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Network Attacks, Web Hacking, and Cryptography

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things

    ★ 4.9 (19) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    ★ 4 (6) · Beginner · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)

    ★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Security and Auditing in Ethereum

    Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Event Monitoring, Exploit development, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Security Architecture Review, Patch Management, Code Review, Incident Management, Application Deployment, Authorization (Computing), Data Validation

    ★ 4.8 (30) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud 日本語版

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Continuous Monitoring, Application Security, Vulnerability Management, Threat Management, Data Security, Security Controls, System Monitoring, Event Monitoring, Security Management, Infrastructure Security, Threat Detection

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    ★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
1…678…9

In summary, here are 10 of our most popular mitm+attacks courses

  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Red Teaming LLM Applications: DeepLearning.AI
  • Detect & Respond to Mobile AI Threats: Coursera
  • Advanced Penetration Techniques: Packt
  • Strategize, Roadmap, and Mitigate AI Projects: Coursera
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Advanced Network Attacks, Web Hacking, and Cryptography: Packt
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Cyber Attack Countermeasures: New York University
  • Security and Auditing in Ethereum: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok