- Continuous Monitoring
- Cyber Attacks
- Cloud Security
- Security Information and Event Management (SIEM)
- Threat Management
- Threat Detection
- Disaster Recovery
- Cyber Threat Hunting
- Problem Management
- Cybersecurity
- Computer Security Incident Management
- Record Keeping
Detect, Respond, and Recover from Cloud Cybersecurity Attacks
Completed by Adam Pappas
December 16, 2024
21 hours (approximately)
Adam Pappas's account is verified. Coursera certifies their successful completion of Detect, Respond, and Recover from Cloud Cybersecurity Attacks
What you will learn
Analyze logging systems in a cloud environment.
Configure security monitoring systems to efficiently identify and mitigate threats to a cloud environment.
Define the lifecycle of a security incident and the process to identify, document, and prevent future incidents.
Explain the purpose of a Disaster Recovery Plan and how this affects data retention and recovery.
Skills you will gain

