Starweaver
Foundations of Cybersecurity Operations

Ends tomorrow: Discover new skills with 30% off courses from industry experts. Save now.

Starweaver

Foundations of Cybersecurity Operations

Gleb Marchenko
Starweaver

Instructors: Gleb Marchenko

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Analyze CIA triad, attack surfaces, frameworks, and risk management to address threats.

  • Design secure access controls, identity, and secrets management to protect systems/data.

  • Describe the modern attack landscape, and human-centric and web-based threats.

  • Apply strategies for SOC workflows, highlighting key roles, and practical operations.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

September 2025

Assessments

4 assignments¹

AI Graded see disclaimer
Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices. You’ll focus on real-world applications like zero trust, identity and access management, and Security Operations Center workflows, while exploring tools such as SIEM, XDR, and threat intelligence. Through expert instruction, case studies, and practical demonstrations, you’ll gain the skills to detect and respond to threats, protect sensitive data, and mitigate risks—while addressing common challenges like social engineering, insider threats, and behavioral biases.

What's included

1 video1 reading1 plugin

In this module, you’ll learn the foundations of cybersecurity by exploring the CIA triad, key roles, domains, and frameworks that guide modern security practices. You’ll examine how cybersecurity supports enterprises, governments, and industries in safeguarding digital environments. Through expert explanations, case studies, and practical insights, you’ll gain the skills to understand core principles, apply frameworks, and recognize the importance of cybersecurity in today’s threat landscape.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll learn how to secure digital identities and manage access through core IAM principles, Zero Trust, and multi-factor authentication. You’ll explore privileged access management and modern strategies for controlling system entry, while understanding how layered methods build stronger, business-aligned security architectures. By the end, you’ll be equipped to design identity and access policies that reduce risks and ensure compliance across systems.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll learn how to identify and mitigate threats by exploring attacker motives, tactics, and the evolving threat landscape. You’ll examine modern human-centric risks such as phishing and social engineering, along with software and web-based vulnerabilities. Through practical insights into key cybersecurity tools and mitigation strategies, you’ll gain the skills to strengthen defenses while maintaining operational simplicity.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll learn how to structure and operate a Security Operations Center (SOC) by examining its roles, workflows, and team responsibilities. You’ll break down the technologies and processes that drive monitoring, incident detection, and response—exploring how SOC tools empower enterprises to align security with business goals. Through expert walkthroughs, practical examples, and real-world case studies, you’ll gain the skills to design, evaluate, and manage SOC operations with confidence and clarity.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this concluding module, you’ll apply your knowledge by designing an incident response plan for a phishing-based credential compromise. You’ll integrate key concepts from the course—covering threat analysis, identity security, and SOC practices—to build a practical, actionable response framework. By working through this real-world scenario, you’ll gain confidence in handling phishing incidents and strengthen your ability to safeguard organizational systems.

What's included

1 video1 peer review

Instructors

Gleb Marchenko
3 Courses165 learners
Starweaver
Starweaver
431 Courses795,574 learners

Offered by

Starweaver

Explore more from Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.