CFR: Reconnaissance, Attack, and Post-Attack Analysis

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

CFR: Reconnaissance, Attack, and Post-Attack Analysis

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Learn how AI hacking tools can break into home routers in under 10 minutes and why cybersecurity is crucial
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →