This program equips cybersecurity professionals, network engineers, SOC analysts, and security architects with the expertise to identify, analyze, and mitigate the full spectrum of modern cyber threats targeting enterprise systems. You’ll begin by exploring the foundations of the cyber threat landscape, examining common attacker profiles, motivations, and methodologies using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through practical demonstrations, you will learn how adversaries conduct reconnaissance, exploit system weaknesses, and leverage TTPs to compromise networks—and how defenders can detect, disrupt, and respond to these threats in real-world environments.

Enjoy unlimited growth with a year of Coursera Plus for $199 (regularly $399). Save now.

Cyber Threats and Network Security Foundations
This course is part of Cyber Threat Intelligence and Incident Response Specialization

Instructor: Edureka
Included with
Recommended experience
What you'll learn
Analyze Cyber Threat Landscapes by identifying threat actors, mapping their TTPs using MITRE ATT&CK, and understanding the Cyber Kill Chain.
Evaluate Attack Vectors and Exploitation Techniques to detect and mitigate common intrusion pathways.
Implement Operating System Security Controls through privilege management, and log auditing across Windows/Linux environments.
Design and Monitor Secure Network Architectures using segmentation, IDS/IPS systems, intrusion detection for defense-in-depth protection.
Skills you'll gain
- Threat Modeling
- Malware Protection
- Vulnerability Management
- Cyber Threat Hunting
- Vulnerability Assessments
- Cyber Security Assessment
- Cyber Attacks
- Network Monitoring
- Incident Response
- Operating System Administration
- Hardening
- Cyber Engineering
- Network Security
- MITRE ATT&CK Framework
- Cyber Threat Intelligence
- Threat Management
- Intrusion Detection and Prevention
- Cybersecurity
- Incident Management
- Threat Detection
Details to know

Add to your LinkedIn profile
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Define the evolving cybersecurity landscape by analyzing key threats, adversaries, and intelligence frameworks. Learn how attackers operate through the Cyber Kill Chain and MITRE ATT&CK models, uncover threat actor motives, and map real-world TTPs. Gain hands-on experience collecting and analyzing threat intelligence using tools like Maltego and theHarvester to build actionable insights that strengthen organizational defenses.
What's included
12 videos7 readings3 assignments
Explore how attackers exploit human behavior and system vulnerabilities to breach defenses. Explore social engineering, phishing, and malware delivery techniques used to compromise organizations. Gain hands-on experience simulating phishing attacks, analyzing malicious payloads, and investigating ransomware behavior to strengthen your ability to detect, analyze, and mitigate exploitation attempts.
What's included
10 videos3 readings3 assignments
Strengthen enterprise environments by applying comprehensive operating system and network security controls. Learn to harden system configurations, enforce privilege management, and monitor user activity to prevent unauthorized access. Design and protect network infrastructures using intrusion detection systems, segmentation, and traffic analysis tools. Gain hands-on experience building a layered defense strategy that ensures system integrity, continuous monitoring, and rapid detection of anomalies across organizational networks.
What's included
10 videos3 readings3 assignments
This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.
What's included
1 video1 reading2 assignments1 discussion prompt
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Explore more from Computer Security and Networks
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
This course is ideal for cybersecurity professionals, SOC analysts, network security engineers, system administrators, and IT security practitioners who want to strengthen their skills in cyber threat analysis and network defense. No advanced cybersecurity experience is required, but basic familiarity with IT systems is helpful.
The course covers the foundations of cyber threats, attack vectors, malware and ransomware behavior, operating system security, network defense, intrusion detection, and threat intelligence. You will learn how to analyze attacker tactics, harden OS configurations, monitor networks, and detect intrusions using real-world tools.
Yes! You will complete interactive labs and demonstrations using industry-relevant tools along with Kali Linux such as Maltego, theHarvester, Nmap, and OS log auditing utilities. You’ll practice detecting attacks, analyzing traffic, inspecting malware indicators, and hardening systems.
More questions
Financial aid available,
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.



