This program equips cybersecurity professionals, network engineers, SOC analysts, and security architects with the expertise to identify, analyze, and mitigate the full spectrum of modern cyber threats targeting enterprise systems. You’ll begin by exploring the foundations of the cyber threat landscape, examining common attacker profiles, motivations, and methodologies using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through practical demonstrations, you will learn how adversaries conduct reconnaissance, exploit system weaknesses, and leverage TTPs to compromise networks—and how defenders can detect, disrupt, and respond to these threats in real-world environments.

Cyber Threats and Network Security Foundations

位教师:Edureka
访问权限由 New York State Department of Labor 提供
您将学到什么
Analyze Cyber Threat Landscapes by identifying threat actors, mapping their TTPs using MITRE ATT&CK, and understanding the Cyber Kill Chain.
Evaluate Attack Vectors and Exploitation Techniques to detect and mitigate common intrusion pathways.
Implement Operating System Security Controls through privilege management, and log auditing across Windows/Linux environments.
Design and Monitor Secure Network Architectures using segmentation, IDS/IPS systems, intrusion detection for defense-in-depth protection.
您将获得的技能
- Cyber Threat Intelligence
- Cybersecurity
- Cyber Security Assessment
- Operating System Administration
- Vulnerability Assessments
- Cyber Engineering
- Incident Response
- Threat Detection
- Cyber Attacks
- Cyber Threat Hunting
- Hardening
- Incident Management
- MITRE ATT&CK Framework
- Malware Protection
- Threat Modeling
- Network Monitoring
- Threat Management
- Network Security
- Vulnerability Management
- Intrusion Detection and Prevention
- 技能部分已折叠。显示 8 项技能,共 20 项。
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Define the evolving cybersecurity landscape by analyzing key threats, adversaries, and intelligence frameworks. Learn how attackers operate through the Cyber Kill Chain and MITRE ATT&CK models, uncover threat actor motives, and map real-world TTPs. Gain hands-on experience collecting and analyzing threat intelligence using tools like Maltego and theHarvester to build actionable insights that strengthen organizational defenses.
涵盖的内容
12个视频7篇阅读材料3个作业
Explore how attackers exploit human behavior and system vulnerabilities to breach defenses. Explore social engineering, phishing, and malware delivery techniques used to compromise organizations. Gain hands-on experience simulating phishing attacks, analyzing malicious payloads, and investigating ransomware behavior to strengthen your ability to detect, analyze, and mitigate exploitation attempts.
涵盖的内容
10个视频3篇阅读材料3个作业
Strengthen enterprise environments by applying comprehensive operating system and network security controls. Learn to harden system configurations, enforce privilege management, and monitor user activity to prevent unauthorized access. Design and protect network infrastructures using intrusion detection systems, segmentation, and traffic analysis tools. Gain hands-on experience building a layered defense strategy that ensures system integrity, continuous monitoring, and rapid detection of anomalies across organizational networks.
涵盖的内容
10个视频3篇阅读材料3个作业
This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.
涵盖的内容
1个视频1篇阅读材料2个作业1个讨论话题
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Computer Science 浏览更多内容
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。





