System & Network Security Essentials

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

System & Network Security Essentials

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Modern cyberattacks target systems, networks, cloud infrastructure, and connected devices — and organizations need professionals who understand how these attacks really work. This course lays the groundwork for system and network security by examining real-world threat-attack techniques, malware behavior, and other network evasion tactics common to most modern breaches. You will learn about the mechanics of password attacks, authentication vulnerabilities, privilege escalation principles, malware propagation patterns, as well as static and dynamic analysis details. The course also covers network sniffing, ARP poisoning, IDS/IPS detection logic, firewall evasion concepts, and Endpoint bypass techniques. Then, you will be exposed to the latest threat trends such as AI-based malware, ransomware-as-a-service ecosystem, cloud privilege escalation risk, and IoT/OT attack surface. Designed for security-focused learners, this course strengthens attacker methodology understanding while reinforcing defensive monitoring and detection perspectives used in real enterprise security operations. Disclaimer: CEH is a trademark of EC-Council. This course is not affiliated with or endorsed by EC-Council.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →