Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

AI & Cybersecurity Threats, Global Actors, and Trends

Packt via Coursera

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course explores the intersection of Artificial Intelligence and cybersecurity, offering insights into the evolving landscape of digital threats. Students will gain a comprehensive understanding of how AI is shaping the cybersecurity threat environment, from the rise of AI-powered malware to state-sponsored cyberattacks and disinformation campaigns. Throughout the course, learners will be equipped with the tools and strategies needed to defend against these sophisticated threats, while also considering the ethical and geopolitical dimensions of AI in cybersecurity. The course is structured into key modules that guide students through real-world case studies, including AI's role in cyber warfare, the digital strategies of global actors like Russia, China, Iran, and North Korea, and the implications of emerging technologies like blockchain and Web3. Each module delves into both the technical and strategic aspects of modern cybersecurity, offering practical approaches to defending against the next wave of cyberattacks. This course is ideal for cybersecurity professionals, business leaders, and anyone interested in understanding the complex, global nature of cyber threats. It requires a foundational understanding of cybersecurity principles and is suitable for intermediate learners in the field. Students will gain knowledge that can be applied immediately to enhance organizational security postures. By the end of the course, you will be able to identify and mitigate AI-driven cyber threats, analyze the geopolitical implications of cyber warfare, and apply cutting-edge strategies for securing systems against future cyberattacks.

Syllabus

  • Introduction
    • In this module, we will trace the evolution of cyber threats from early malware to today’s AI-accelerated campaigns, map the current cybersecurity landscape by highlighting adversary behaviors and defensive advances, and surface the biggest challenges and opportunities shaping strategic decision-making this year.
  • AI-powered Malware and Its Impact
    • In this module, we will unpack how adversaries weaponize AI for phishing, evasion, and exploitation, assess the operational and business impacts of AI-enabled malware campaigns, and translate insights into concrete countermeasures across people, process, and technology.
  • The Role of AI in Information Operations (IO)
    • In this module, we will examine AI’s role in crafting and distributing persuasive, deceptive content, explore detection frameworks, signals, and response playbooks for IO threats, and debate ethics while forecasting how AI will reshape global information conflicts.
  • The Next Phase of AI and Security
    • In this module, we will look ahead at AI’s evolution and its impact on security operations, dive into proactive detection, response orchestration, and autonomous workflows, and anticipate what’s next for AI in cybersecurity—and how to prepare.
  • The Big Four: Russia, China, Iran, and North Korea
    • In this module, we will survey the landscape of state-sponsored cyber operations, study how the “Big Four” execute campaigns and the strategic goals they pursue, and convert lessons from real incidents into actionable defensive models.
  • Russia's Cyber Warfare Tactics
    • In this module, we will connect doctrine to operations—from Ukraine-driven shifts to global campaigns—dissect attacks on critical infrastructure, government, and public opinion, and identify defenses that blunt espionage, influence ops, and covert proxies.
  • China's Growing Cyber Capabilities
    • In this module, we will map the PLA’s cyber force, investments, and global posture, walk through emblematic intrusions including the Digital Silk Road and censorship as power, and explore future scenarios from arms-race dynamics to governance pathways.
  • Iran's Cyberattacks and Regional Tensions
    • In this module, we will chart Iran’s journey from early operations to post-Stuxnet acceleration, analyze targeting patterns across energy and finance alongside influence operations, and examine present-day conflict spillovers and adaptive tactics under pressure.
  • North Korea's Exploitation of the Supply Chain
    • In this module, we will trace North Korea’s path to cyber power and monetization strategies, unpack landmark supply chain compromises and revenue-generation hacks, and look ahead at sanctions-driven adaptation and next-phase AI-powered operations.
  • The Threat Landscape in 2025
    • In this module, we will spotlight the high-stakes dynamics defining cybersecurity in 2025, break down trends and vulnerabilities alongside macro forces shaping attacker behavior, and convert insights into readiness plans, workforce skills, and resilient architectures.
  • The Rise of Infostealer Malware
    • In this module, we will examine how infostealers infiltrate, persist, and siphon sensitive data, explore the underground economy that fuels accessibility and scale, and outline practical safeguards and incident handling for this fast-evolving threat.
  • The Impact of Compromised Identities in Hybrid Environments
    • In this module, we will redefine perimeter thinking for hybrid work and distributed systems, study real breaches to expose weaknesses in authentication, access, and session management, and operationalize best practices for identity protection and future-ready IAM.
  • The Democratization of Cyber Capabilities
    • In this module, we will explore the widening access to advanced offensive capabilities, trace the shift from lone actors to syndicates fueled by marketplaces and AI, and build a blueprint for smarter defenses that scale with the threat.
  • Maturing Security Operations in the Cloud
    • In this module, we will clarify roles, risks, and controls unique to cloud operations, detail patterns for monitoring, incident handling, and encryption at scale, and weave identity, automation, and application security into day-two operations.
  • The Impact of Regulations on Cloud Providers
    • In this module, we will translate regulatory requirements into actionable cloud practices, compare frameworks, certifications, and shared responsibility in compliance, and explore tooling and governance models that reduce cost and risk.
  • The Rise of Web3 and Crypto Heists
    • In this module, we will introduce Web3’s architecture and the threat contours it creates, dissect famous exploits including DeFi rug pulls and cross-chain bridge failures, and share actionable safeguards for builders, exchanges, and end users.
  • The Cloud Security Threat Landscape
    • In this module, we will survey the threats most often realized in cloud environments, connect intel-driven monitoring with automated guardrails and verification, and convert breach retrospectives into concrete architectural improvements.
  • Regional Forecasts - EMEA (Europe, Middle East, and Africa)
    • In this module, we will map regulatory, geopolitical, and market forces across EMEA, examine ransomware, fraud, supply chain, and cloud-specific challenges, and highlight workforce initiatives and AI-driven innovations that are shaping regional defenses.

Taught by

Packt - Course Instructors

Reviews

Start your review of AI & Cybersecurity Threats, Global Actors, and Trends

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.