Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Cyber Threats and Network Security Foundations

Edureka via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This program equips cybersecurity professionals, network engineers, SOC analysts, and security architects with the expertise to identify, analyze, and mitigate the full spectrum of modern cyber threats targeting enterprise systems. You’ll begin by exploring the foundations of the cyber threat landscape, examining common attacker profiles, motivations, and methodologies using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through practical demonstrations, you will learn how adversaries conduct reconnaissance, exploit system weaknesses, and leverage TTPs to compromise networks—and how defenders can detect, disrupt, and respond to these threats in real-world environments. Building on these fundamentals, you’ll gain hands-on experience analyzing high-impact attack vectors, including phishing, social engineering, malware delivery, and ransomware campaigns. You will simulate phishing attacks, inspect malicious payloads, analyze malware behavior, and identify compromise indicators using tools like SET, VirusTotal, and sandboxing utilities. These exercises help you understand how attackers infiltrate systems and how defensive controls can block, contain, and investigate exploitation attempts. Next, the program delves into operating system and network security, covering strategies for OS hardening, secure configuration, privilege management, and log auditing. You’ll design secure network architectures, implement segmentation, and deploy IDS/IPS mechanisms to strengthen enterprise defenses. Practical labs using Wireshark and Snort will teach you how to analyze network traffic, detect intrusions, and identify anomalies that signal potential attacks. The course also emphasizes continuous monitoring, threat intelligence, and defense-in-depth strategies. Using OSINT and CTI tools such as Maltego and theHarvester, you will practice gathering intelligence, identifying indicators of compromise, and applying threat intelligence to improve detection and response workflows across security operations. Finally, you’ll integrate all these capabilities in a capstone project, analyzing a simulated end-to-end attack scenario, hardening systems and networks, building intrusion detection rules, and demonstrating a comprehensive cybersecurity defense strategy aligned with industry best practices. By the end of this program, you will be able to: - Identify and evaluate cyber threats, attacker behaviors, and common attack vectors. - Map adversary TTPs using frameworks like MITRE ATT&CK and the Cyber Kill Chain. - Detect, analyze, and mitigate phishing, malware, and ransomware attacks. - Apply secure OS configuration, privilege management, and log auditing techniques. - Design and implement secure network architectures using segmentation and IDS/IPS. - Perform network traffic analysis and intrusion detection with Wireshark and Snort. - Collect and operationalize cyber threat intelligence using OSINT and CTI tools. - Build a layered defense-in-depth security strategy to protect enterprise systems. This specialization is designed for cybersecurity engineers, SOC analysts, network security professionals, system administrators, blue-team defenders, and IT security specialists who want to build strong foundational and practical skills in cyber threat analysis and network defense. Join us to gain the skills, tools, and strategies required to secure modern networks, detect cyber threats, and defend enterprise systems against evolving adversarial attacks.

Syllabus

  • Introduction to Cybersecurity Threats
    • Define the evolving cybersecurity landscape by analyzing key threats, adversaries, and intelligence frameworks. Learn how attackers operate through the Cyber Kill Chain and MITRE ATT&CK models, uncover threat actor motives, and map real-world TTPs. Gain hands-on experience collecting and analyzing threat intelligence using tools like Maltego and theHarvester to build actionable insights that strengthen organizational defenses.
  • Attack Vectors and Exploitation
    • Explore how attackers exploit human behavior and system vulnerabilities to breach defenses. Explore social engineering, phishing, and malware delivery techniques used to compromise organizations. Gain hands-on experience simulating phishing attacks, analyzing malicious payloads, and investigating ransomware behavior to strengthen your ability to detect, analyze, and mitigate exploitation attempts.
  • Network and Operating System Security
    • Strengthen enterprise environments by applying comprehensive operating system and network security controls. Learn to harden system configurations, enforce privilege management, and monitor user activity to prevent unauthorized access. Design and protect network infrastructures using intrusion detection systems, segmentation, and traffic analysis tools. Gain hands-on experience building a layered defense strategy that ensures system integrity, continuous monitoring, and rapid detection of anomalies across organizational networks.
  • Course Wrap-Up and Assessment
    • This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.

Taught by

Edureka

Reviews

Start your review of Cyber Threats and Network Security Foundations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.