Coursera
Coursera Logo

University of Colorado Boulder - Detecting and Mitigating Cyber Threats and Attacks 

  • Offered byCoursera

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 
Overview

Duration

9 hours

Mode of learning

Online

Difficulty level

Beginner

Credential

Certificate

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 
Highlights

  • Learn from lecturer of University of Colorado
  • 40% got a pay increase or promotion
  • 57% got a tangible career benefit from this course
  • Earn a certificate from University of Colorado
Read more
Details Icon

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company's or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach
Read more

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 
Curriculum

Introduction and Firewalls

Introduction

About the Instructor

Firewall basics

Advanced firewalls

Types of firewall configurations

Intrusion Detection and Prevention

Detection Methods

Intrusion Detection Systems

Intrusion Prevention Systems

Detection and Prevention tools

Anti-Virus/Anti-Malware

Snort

HIDs and HIPs

Splunk

Attacks are Inevitable - Case Study

Attacks are inevitable - Prepare

Before the Attack

During the Attack

After the Attack

Understanding detection and mitigation

How data breaches are exposed

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6715 CoursesRight Arrow Icon

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 
Students Ratings & Reviews

5/5
Verified Icon1 Rating
A
Aishwarya Thiyagarajan
Detecting and Mitigating Cyber Threats and Attacks
Offered by Coursera
5
Other: I really enjoyed the learning process. I was able to learn deeper about those cyber attacks and its threats
Reviewed on 16 May 2021Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

Detecting and Mitigating Cyber Threats and Attacks
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...