Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Cybersecurity and Network Defense Fundamentals

Edureka via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This program equips aspiring cybersecurity professionals, SOC analysts, network engineers, and system administrators with the foundational knowledge and practical skills required to understand, analyze, and defend against modern cyber threats in enterprise environments. You will begin by exploring the evolving cyber threat landscape, examining attacker motivations, adversary methodologies, and structured attack lifecycles using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through guided demonstrations and applied analysis, you will learn how attackers conduct reconnaissance, exploit vulnerabilities, and move across networks—and how defenders detect and disrupt these activities using structured security operations techniques. Building on this foundation, you will develop practical Linux skills essential for cybersecurity operations. Working within a Kali Linux environment, you will execute core command-line operations, analyze system logs, apply regular expressions for investigation, and map adversary techniques using MITRE ATT&CK Navigator. The course also introduces structured threat intelligence practices, including OSINT collection and STIX/TAXII-based intelligence sharing. Using tools such as Maltego and theHarvester, you will learn how to uncover external attack surfaces and enhance situational awareness through intelligence-driven defense. Next, the program explores attack vectors and exploitation techniques commonly used in real-world cyber incidents. You will analyze phishing campaigns, social engineering tactics, malware delivery methods, and ransomware lifecycles. Through controlled demonstrations and sandbox-based analysis, you will observe malicious behavior, identify indicators of compromise, and understand how attackers transition from initial access to system impact. The course then advances into operating system security and network monitoring. You will apply secure configuration principles, enforce privilege management controls, audit system activity, and assess endpoint security posture across Windows and Linux environments. On the network side, you will design segmented architectures, implement intrusion detection and prevention concepts, and analyze packet-level traffic using Wireshark and Snort to detect anomalies and suspicious activity. Finally, you will integrate these capabilities in a structured practice project where you map a full threat lifecycle, analyze indicators, harden systems, and validate monitoring controls—demonstrating a layered defense strategy aligned with enterprise best practices. By the end of this program, you will be able to: -Analyze cyber threats, attacker behaviors, and structured attack lifecycles. -Map adversary tactics and techniques using MITRE ATT&CK and the Cyber Kill Chain. -Apply Linux command-line tools for log analysis, investigation, and threat mapping. -Collect and evaluate threat intelligence using OSINT and structured intelligence feeds. -Identify phishing, malware, and ransomware exploitation techniques. -Implement operating system hardening and privilege management controls. -Design secure network architectures using segmentation and IDS/IPS principles. -Analyze network traffic and detect suspicious activity using monitoring tools. This course is designed for SOC analysts, cybersecurity practitioners, network and infrastructure engineers, system administrators, and early-career security professionals seeking strong foundational and operational skills in cyber threat analysis and network defense. Join us to build the analytical mindset, technical capability, and structured defense strategies required to protect enterprise systems against modern cyber threats.

Syllabus

  • Cyber Threat Intelligence and Linux Foundations for Security Operations
    • Analyze the modern cyber threat landscape by examining threat actors, motivations, and attack lifecycles, and applying structured frameworks such as the Cyber Kill Chain and MITRE ATT&CK to understand adversary behavior. Develop foundational Linux skills for cybersecurity operations by working in the Kali Linux environment to perform command-line analysis, log investigation, and threat mapping, while evaluating threat intelligence and OSINT sources to enhance situational awareness and support informed defensive decision-making.
  • Attack Vectors, Social Engineering, and Malware Analysis
    • Examine how attackers exploit human and technical vulnerabilities by analyzing common attack vectors, social engineering techniques, and malware operations. This module explores phishing, spear-phishing, and exploitation pathways, and introduces malware and ransomware lifecycles through hands-on sandbox analysis and controlled execution to understand delivery methods, behavior, and impact.
  • Network and Operating System Security Monitoring
    • Implement secure system and network defenses by applying operating system hardening principles, privilege controls, and network security architectures. This module focuses on configuring secure baselines, designing segmented networks, and using monitoring tools such as IDS/IPS and traffic analysis utilities to detect anomalous or unauthorized activity.
  • Course Wrap-Up and Assessment
    • This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.

Taught by

Edureka

Reviews

Start your review of Cybersecurity and Network Defense Fundamentals

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.