- Configuration Management
- Cyber Threat Intelligence
- Continuous Monitoring
- Intrusion Detection and Prevention
- Cyber Attacks
- Threat Modeling
- Network Security
- Vulnerability Assessments
- Threat Detection
- Vulnerability Management
- Cyber Operations
- Patch Management
Deception As a Defense
Completed by Samad Rezaei
September 3, 2025
5 hours (approximately)
Samad Rezaei's account is verified. Coursera certifies their successful completion of Deception As a Defense
What you will learn
Identify emerging cyber threats and vulnerabilities affecting modern networks.
Demonstrate effective vulnerability assessment automation techniques.
Implement advanced defensive measures to enhance network security.
Configure and secure network perimeter devices, including routers and firewalls.
Skills you will gain

