• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cyberattacks

Results for "cyberattacks"


  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Network Security, Multi-Factor Authentication

    5
    Rating, 5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

    Build toward a degree

    4.4
    Rating, 4.4 out of 5 stars
    ·
    25 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CyberSec First Responder – Advanced (CFR-A): Attack

    Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, AI Security, Cyber Operations, Threat Modeling, Zero Trust Network Access

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Homeland Security and Cybersecurity Future

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    161 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Incident Response for Windows

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Digital Forensics, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Threat Management, Endpoint Security, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Cyber Risk, Information Technology

    Beginner · Course · 3 - 6 Months

  • P

    Packt

    CyberSec First Responder (CFR-310)

    Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Digital Forensics, Network Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Intrusion Detection Systems (IDS)

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    Universidades Anáhuac

    Digital Shield: Cybersecurity for Data and System Protection

    Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    CyberPatriot

    Skills you'll gain: Ubuntu, Cybersecurity, Cyber Attacks, Microsoft Windows, Computer Security, Computer Security Awareness Training, Information Systems Security, Linux, Cyber Security Policies, Network Security, Virtualization, Linux Commands, Linux Administration, Data Ethics, Data Security, Virtualization and Virtual Machines, Hardening, Command-Line Interface, Operating System Administration, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Cybersecurity Foundations & Threat Mitigation

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to cyberattacks

introduction to cybersecurity tools & cyberattacks
1…8910…19

In summary, here are 10 of our most popular cyberattacks courses

  • Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
  • Cyber Security Technologies: Illinois Tech
  • CyberSec First Responder – Advanced (CFR-A): Attack: CertNexus
  • AI & Cybersecurity Threats, Global Actors, and Trends: Packt
  • Cyber Threats and Network Security Foundations: Edureka
  • Homeland Security and Cybersecurity Future: University of Colorado System
  • Incident Response for Windows: Packt
  • CyberSec First Responder (CFR-310): Packt
  • Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
  • Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok