Cybersecurity is no longer limited to specialists—it’s a core competency for anyone in IT or business operations. With global cybercrime costs projected to exceed $10.5 trillion by 2025, organizations cannot rely on outdated methods. This course equips you with a practical foundation in cybersecurity operations, focusing on real-world threats such as ransomware, phishing, insider risks, and data breaches.

Jusqu'à demain : Découvrez de nouvelles compétences avec 30 % de réduction sur les cours dispensés par des experts du secteur. Économisez maintenant.


Expérience recommandée
Ce que vous apprendrez
Analyze CIA triad, attack surfaces, frameworks, and risk management to address threats.
Design secure access controls, identity, and secrets management to protect systems/data.
Describe the modern attack landscape, and human-centric and web-based threats.
Apply strategies for SOC workflows, highlighting key roles, and practical operations.
Compétences que vous acquerrez
- Catégorie : Security Information and Event Management (SIEM)
- Catégorie : Cyber Threat Intelligence
- Catégorie : Identity and Access Management
- Catégorie : Incident Response
- Catégorie : Security Management
- Catégorie : Security Strategy
- Catégorie : Computer Security Incident Management
- Catégorie : Threat Management
- Catégorie : General Data Protection Regulation (GDPR)
- Catégorie : Information Systems Security
- Catégorie : Human Factors (Security)
- Catégorie : Endpoint Security
- Catégorie : Cyber Security Policies
- Catégorie : MITRE ATT&CK Framework
- Catégorie : Zero Trust Network Access
- Catégorie : Security Awareness
- Catégorie : Threat Detection
- Catégorie : Security Controls
- Catégorie : Cyber Attacks
- Catégorie : Cybersecurity
Détails à connaître

Ajouter à votre profil LinkedIn
septembre 2025
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Il y a 6 modules dans ce cours
In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices. You’ll focus on real-world applications like zero trust, identity and access management, and Security Operations Center workflows, while exploring tools such as SIEM, XDR, and threat intelligence. Through expert instruction, case studies, and practical demonstrations, you’ll gain the skills to detect and respond to threats, protect sensitive data, and mitigate risks—while addressing common challenges like social engineering, insider threats, and behavioral biases.
Inclus
1 vidéo1 lecture1 plugin
In this module, you’ll learn the foundations of cybersecurity by exploring the CIA triad, key roles, domains, and frameworks that guide modern security practices. You’ll examine how cybersecurity supports enterprises, governments, and industries in safeguarding digital environments. Through expert explanations, case studies, and practical insights, you’ll gain the skills to understand core principles, apply frameworks, and recognize the importance of cybersecurity in today’s threat landscape.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to secure digital identities and manage access through core IAM principles, Zero Trust, and multi-factor authentication. You’ll explore privileged access management and modern strategies for controlling system entry, while understanding how layered methods build stronger, business-aligned security architectures. By the end, you’ll be equipped to design identity and access policies that reduce risks and ensure compliance across systems.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to identify and mitigate threats by exploring attacker motives, tactics, and the evolving threat landscape. You’ll examine modern human-centric risks such as phishing and social engineering, along with software and web-based vulnerabilities. Through practical insights into key cybersecurity tools and mitigation strategies, you’ll gain the skills to strengthen defenses while maintaining operational simplicity.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to structure and operate a Security Operations Center (SOC) by examining its roles, workflows, and team responsibilities. You’ll break down the technologies and processes that drive monitoring, incident detection, and response—exploring how SOC tools empower enterprises to align security with business goals. Through expert walkthroughs, practical examples, and real-world case studies, you’ll gain the skills to design, evaluate, and manage SOC operations with confidence and clarity.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this concluding module, you’ll apply your knowledge by designing an incident response plan for a phishing-based credential compromise. You’ll integrate key concepts from the course—covering threat analysis, identity security, and SOC practices—to build a practical, actionable response framework. By working through this real-world scenario, you’ll gain confidence in handling phishing incidents and strengthen your ability to safeguard organizational systems.
Inclus
1 vidéo1 évaluation par les pairs
Offert par
En savoir plus sur Security
- Statut : Essai gratuit
- Statut : Essai gratuit
- Statut : Essai gratuit
Kennesaw State University
- Statut : Essai gratuit
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Plus de questions
Aide financière disponible,
¹ Certains travaux de ce cours sont notés par l'IA. Pour ces travaux, vos Données internes seront utilisées conformément à Notification de confidentialité de Coursera.