- Cyber Attacks
- Cyber Threat Intelligence
- Threat Management
- Continuous Monitoring
- Cybersecurity
- Configuration Management
- Threat Modeling
- Intrusion Detection and Prevention
- Cyber Security Strategy
- Threat Detection
- Vulnerability Assessments
- Network Security
Deception As a Defense
Completed by Samad Rezaei
September 3, 2025
5 hours (approximately)
Samad Rezaei's account is verified. Coursera certifies their successful completion of Deception As a Defense
What you will learn
Identify emerging cyber threats and vulnerabilities affecting modern networks.
Demonstrate effective vulnerability assessment automation techniques.
Implement advanced defensive measures to enhance network security.
Configure and secure network perimeter devices, including routers and firewalls.
Skills you will gain

