In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics.

Cela se termine bientôt : Obtenez des compétences de niveau supérieur avec Coursera Plus pour 199 $ (régulièrement 399 $). Économisez maintenant.

CFR: Reconnaissance, Attack, and Post-Attack Analysis
Ce cours fait partie de Spécialisation CyberSec First Responder (Exam CFR-410)

Instructeur : Bill Rosenthal
Inclus avec
Ce que vous apprendrez
In this course, you will analyze reconnaissance threats, various attack types, and post-attack types.
Compétences que vous acquerrez
- Catégorie : Cyber Security Assessment
- Catégorie : Distributed Denial-Of-Service (DDoS) Attacks
- Catégorie : Persistence
- Catégorie : Threat Detection
- Catégorie : Penetration Testing
- Catégorie : Network Security
- Catégorie : Cybersecurity
- Catégorie : Threat Modeling
- Catégorie : Cloud Security
- Catégorie : Threat Management
- Catégorie : Cyber Attacks
- Catégorie : Malware Protection
- Catégorie : Computer Security
- Catégorie : Cyber Threat Intelligence
- Catégorie : Mobile Security
- Catégorie : Vulnerability Assessments
- Catégorie : Information Systems Security
- Catégorie : Exploitation techniques
- Catégorie : Security Engineering
Détails à connaître

Ajouter à votre profil LinkedIn
janvier 2026
1 devoir
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Élaborez votre expertise du sujet
- Apprenez de nouveaux concepts auprès d'experts du secteur
- Acquérez une compréhension de base d'un sujet ou d'un outil
- Développez des compétences professionnelles avec des projets pratiques
- Obtenez un certificat professionnel partageable

Il y a 4 modules dans ce cours
Before threat actors launch their attack in earnest, they gather information. The information available to them is almost always a result of their target's behavior. The attacker simply does their own research, and suddenly they've made their job a lot easier. You need to analyze just what attackers can learn from your organization to get a better picture of what they'll attack, and how.
Inclus
1 lecture5 plugins
You've analyzed the general risks and threats to your systems, and you've identified how attackers can gather intelligence on these systems. Now you can begin to analyze the major attacks themselves. There's a wide variety of ways malicious users can compromise your operations, and it's vital you understand the potential effects of each one on the organization.
Inclus
9 plugins
After reconnaissance and attack, the last phase of the threat process is post-attack. In many cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want to stay in control of the systems they've compromised, continue to evade any countermeasures, and cover their tracks to avoid being identified. All of this means that, if you prematurely terminate your threat assessment efforts, they'll have gone to waste. Instead, you need to hone your focus on what an attacker does after an attack that can inflict long-lasting harm on your organization.
Inclus
7 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
Inclus
1 lecture1 devoir
Obtenez un certificat professionnel
Ajoutez ce titre à votre profil LinkedIn, à votre curriculum vitae ou à votre CV. Partagez-le sur les médias sociaux et dans votre évaluation des performances.
Instructeur

Offert par
En savoir plus sur Security

CertNexus
Statut : Essai gratuit
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?




Foire Aux Questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Plus de questions
Aide financière disponible,






