This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats.
Cybersecurity Threat Vectors and Mitigation
This course is part of Microsoft Cybersecurity Analyst Professional Certificate
Instructor: Microsoft
Sponsored by Veterans Transition Support
15,381 already enrolled
(234 reviews)
Recommended experience
What you'll learn
Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.
Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.
Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.
Details to know
Add to your LinkedIn profile
21 assignments
See how employees at top companies are mastering in-demand skills
Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Microsoft
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
Dive into the world of cyber threats and attacks and get to know the active threat landscape.
What's included
10 videos17 readings4 assignments2 discussion prompts
Explore the cryptographic methods and standards used to protect data and secure communication.
What's included
12 videos14 readings6 assignments
Examine the various types of threats that can occur during data transmission, the importance of security controls in protecting against these threats, and the importance of keeping applications and devices updated to mitigate these risks.
What's included
9 videos11 readings5 assignments
Explore the different laws, regulations, and industry standards that organizations must adhere to in order to ensure the security of their systems and data.
What's included
9 videos11 readings4 assignments
Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.
What's included
2 videos4 readings2 assignments1 discussion prompt
Why people choose Coursera for their career
Learner reviews
Showing 3 of 234
234 reviews
- 5 stars
81.19%
- 4 stars
15.38%
- 3 stars
1.28%
- 2 stars
0.85%
- 1 star
1.28%
Recommended if you're interested in Information Technology
University of Colorado System
Microsoft
Microsoft
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy