- Cyber Attacks
- Network Security
- Data Security
- Threat Management
- Threat Detection
- Cryptography
- Multi-Factor Authentication
- Cybersecurity
- Security Strategy
- Authentications
- Identity and Access Management
- Active Directory
Cybersecurity Threat Vectors and Mitigation
Completed by ISMAILA ABDUL USMAN
November 10, 2023
19 hours (approximately)
ISMAILA ABDUL USMAN's account is verified. Coursera certifies their successful completion of Cybersecurity Threat Vectors and Mitigation
What you will learn
Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.
Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.
Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.
Skills you will gain

