Cyber Threats and Network Security Foundations

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cyber Threats and Network Security Foundations

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This program equips cybersecurity professionals, network engineers, SOC analysts, and security architects with the expertise to identify, analyze, and mitigate the full spectrum of modern cyber threats targeting enterprise systems. You’ll begin by exploring the foundations of the cyber threat landscape, examining common attacker profiles, motivations, and methodologies using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through practical demonstrations, you will learn how adversaries conduct reconnaissance, exploit system weaknesses, and leverage TTPs to compromise networks—and how defenders can detect, disrupt, and respond to these threats in real-world environments. Building on these fundamentals, you’ll gain hands-on experience analyzing high-impact attack vectors, including phishing, social engineering, malware delivery, and ransomware campaigns. You will simulate phishing attacks, inspect malicious payloads, analyze malware behavior, and identify compromise indicators using tools like SET, VirusTotal, and sandboxing utilities. These exercises help you understand how attackers infiltrate systems and how defensive controls can block, contain, and investigate exploitation attempts. Next, the program delves into operating system and network security, covering strategies for OS hardening, secure configuration, privilege management, and log auditing. You’ll design secure network architectures, implement segmentation, and deploy IDS/IPS mechanisms to strengthen enterprise defenses. Practical labs using Wireshark and Snort will teach you how to analyze network traffic, detect intrusions, and identify anomalies that signal potential attacks. The course also emphasizes continuous monitoring, threat intelligence, and defense-in-depth strategies. Using OSINT and CTI tools such as Maltego and theHarvester, you will practice gathering intelligence, identifying indicators of compromise, and applying threat intelligence to improve detection and response workflow
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Learn how AI hacking tools can break into home routers in under 10 minutes and why cybersecurity is crucial
Medium · Cybersecurity
Up next
How do I delete recovery points under a legal hold or in a locked backup vault for AWS Backup?
Amazon Web Services
Watch →