This program equips cybersecurity professionals, SOC analysts, system administrators, and network engineers with the expertise to detect, investigate, contain, and remediate cybersecurity incidents across enterprise environments. You’ll begin by learning the foundations of the incident response lifecycle, exploring essential concepts such as incident classification, prioritization, communication workflows, and role assignments. Through practical demonstrations, you will understand how organizations prepare for incidents, establish response procedures, and build documentation and playbooks used during real-world emergencies.
以 199 美元(原价 399 美元)购买一年 Coursera Plus,享受无限增长。立即节省

您将学到什么
Analyze security incidents by understanding the incident response lifecycle and identifying roles, phases, and reporting structures.
Detect and validate threats using SIEM monitoring, log correlation, EDR tools, and forensic techniques
Implement containment, eradication, and recovery procedures to stop active threats and restore affected systems safely and systematically.
Evaluate post-incident metrics, lessons learned, and resilience measures to strengthen organizational readiness for future attacks.
您将获得的技能
- Incident Response
- Cyber Engineering
- Threat Management
- Computer Security Incident Management
- Cyber Security Assessment
- Intrusion Detection and Prevention
- Continuous Monitoring
- Malware Protection
- Security Management
- Linux
- Event Monitoring
- Cyber Governance
- Security Testing
- Cyber Attacks
- Incident Management
- Cyber Threat Hunting
- Threat Detection
- Cybersecurity
- Security Information and Event Management (SIEM)
- Endpoint Detection and Response
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Build foundational incident-handling skills by understanding how incidents occur, how they are classified, and how structured planning enables fast and coordinated response. Explore the full incident response lifecycle—from preparation and readiness testing to roles, responsibilities, and communication workflows—while gaining hands-on practice with playbooks and response documentation.
涵盖的内容
11个视频6篇阅读材料3个作业
Strengthen your detection and investigative skills by learning how to monitor systems, analyze events, and validate indicators of compromise. Gain hands-on experience with SIEM log correlation, EDR techniques, DoS/DDoS validation, OSINT reconnaissance detection, and forensic evidence collection to identify and confirm active threats.
涵盖的内容
11个视频3篇阅读材料3个作业
Learn how to contain active threats, isolate compromised systems, and perform safe eradication steps to restore operational integrity. Practice removing malicious artifacts, rebuilding affected systems, measuring post-incident performance, and documenting lessons learned to strengthen future resilience and readiness.
涵盖的内容
7个视频5篇阅读材料3个作业
This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.
涵盖的内容
1个视频1篇阅读材料2个作业1个讨论话题
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
从 Computer Security and Networks 浏览更多内容
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
This course is ideal for cybersecurity professionals, SOC analysts, system administrators, network engineers, and anyone involved in threat detection, incident response, and security operations.
You will learn incident response planning, threat detection, forensic analysis, DoS/DDoS mitigation, containment, eradication, recovery, and hands-on response techniques using real-world cybersecurity tools.
Yes. The course includes practical exercises using tools like SIEM dashboards, Wireshark, theHarvester, hping3, EDR tools, forensic utilities, and Linux-based incident response workflows.
更多问题
提供助学金,
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。







