In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics.

CFR: Reconnaissance, Attack, and Post-Attack Analysis

位教师:Bill Rosenthal
访问权限由 Coursera Learning Team 提供
您将学到什么
In this course, you will analyze reconnaissance threats, various attack types, and post-attack types.
您将获得的技能
- Penetration Testing
- Distributed Denial-Of-Service (DDoS) Attacks
- Vulnerability Assessments
- Cyber Attacks
- Malware Protection
- Threat Management
- Cloud Security
- Persistence
- Network Security
- Exploitation techniques
- Information Systems Security
- Cybersecurity
- Mobile Security
- Computer Security
- Cyber Threat Intelligence
- Security Engineering
- Cyber Security Assessment
- Threat Detection
- Threat Modeling
- 技能部分已折叠。显示 9 项技能,共 19 项。
要了解的详细信息

添加到您的领英档案
1 项作业
January 2026
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Before threat actors launch their attack in earnest, they gather information. The information available to them is almost always a result of their target's behavior. The attacker simply does their own research, and suddenly they've made their job a lot easier. You need to analyze just what attackers can learn from your organization to get a better picture of what they'll attack, and how.
涵盖的内容
1篇阅读材料5个插件
You've analyzed the general risks and threats to your systems, and you've identified how attackers can gather intelligence on these systems. Now you can begin to analyze the major attacks themselves. There's a wide variety of ways malicious users can compromise your operations, and it's vital you understand the potential effects of each one on the organization.
涵盖的内容
9个插件
After reconnaissance and attack, the last phase of the threat process is post-attack. In many cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want to stay in control of the systems they've compromised, continue to evade any countermeasures, and cover their tracks to avoid being identified. All of this means that, if you prematurely terminate your threat assessment efforts, they'll have gone to waste. Instead, you need to hone your focus on what an attacker does after an attack that can inflict long-lasting harm on your organization.
涵盖的内容
7个插件
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1篇阅读材料1个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







