Cybersecurity and Network Defense Fundamentals

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cybersecurity and Network Defense Fundamentals

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This program equips aspiring cybersecurity professionals, SOC analysts, network engineers, and system administrators with the foundational knowledge and practical skills required to understand, analyze, and defend against modern cyber threats in enterprise environments. You will begin by exploring the evolving cyber threat landscape, examining attacker motivations, adversary methodologies, and structured attack lifecycles using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through guided demonstrations and applied analysis, you will learn how attackers conduct reconnaissance, exploit vulnerabilities, and move across networks—and how defenders detect and disrupt these activities using structured security operations techniques. Building on this foundation, you will develop practical Linux skills essential for cybersecurity operations. Working within a Kali Linux environment, you will execute core command-line operations, analyze system logs, apply regular expressions for investigation, and map adversary techniques using MITRE ATT&CK Navigator. The course also introduces structured threat intelligence practices, including OSINT collection and STIX/TAXII-based intelligence sharing. Using tools such as Maltego and theHarvester, you will learn how to uncover external attack surfaces and enhance situational awareness through intelligence-driven defense. Next, the program explores attack vectors and exploitation techniques commonly used in real-world cyber incidents. You will analyze phishing campaigns, social engineering tactics, malware delivery methods, and ransomware lifecycles. Through controlled demonstrations and sandbox-based analysis, you will observe malicious behavior, identify indicators of compromise, and understand how attackers transition from initial access to system impact. The course then advances into operating system security and network monitoring. You will apply secure configuration principles, enforce privilege management controls, au
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Up next
Wireshark Tutorial For Beginners | How Wireshark Works | Packet Analysis Explained | Simplilearn
Simplilearn
Watch →