To round out your skills as a cybersecurity practitioner, you'll analyze incidents and indicators of compromise (IOCs) using Windows- and Linux-based tools. Then, you'll deploy an incident handling and response architecture, mitigate incidents, and hand over incident information to forensic personnel. Lastly, you'll investigate cybersecurity incidents by applying a forensic investigation plan, securely collecting and analyzing electronic evidence, and following up on the results of an investigation.

您将学到什么
You will perform active asset and network analysis to detect incidents, respond to incidents, and investigate incidents using forensic analysis.
您将获得的技能
- Incident Management
- Analysis
- Mitigation
- Network Analysis
- Continuous Monitoring
- Linux Commands
- Intrusion Detection and Prevention
- Network Security
- Cybersecurity
- Digital Forensics
- Computer Security Incident Management
- Cyber Threat Hunting
- Bash (Scripting Language)
- Incident Response
- Windows PowerShell
- Criminal Investigation and Forensics
- Computer Security
- Cyber Attacks
- Information Systems Security
- Security Information and Event Management (SIEM)
- 技能部分已折叠。显示 10 项技能,共 20 项。
要了解的详细信息

添加到您的领英档案
1 项作业
January 2026
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
The analysis you perform on log data is important, but it tends to remain static. Most of the intelligence you'll be gathering and analyzing from logs will be actionable only after the event is either underway or already finished. So, to complement this static analysis, you need something a bit more dynamic. That's why, in this lesson, you'll take a more active approach to analyzing your organizational assets.
涵盖的内容
1篇阅读材料5个插件
Now that you've performed a comprehensive analysis of your network and other assets, you need to prepare for what much of this analysis will reveal—the reality of a security incident affecting your organization. Responding quickly, yet cautiously, to the inevitable can make all the difference in preventing serious, long-term harm to the organization.
涵盖的内容
5个插件
Following a cybersecurity incident, you may be called on to perform forensic analysis, such as collecting evidence and determining how and why the incident occurred, and who caused it.
涵盖的内容
5个插件
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1篇阅读材料1个作业1个插件
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







