Packt
AI & Cybersecurity Threats, Global Actors, and Trends
Packt

AI & Cybersecurity Threats, Global Actors, and Trends

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand the impact of AI on modern cybersecurity threats and defenses.

  • Identify the cybersecurity tactics used by global state actors in cyber warfare.

  • Examine real-world case studies of major cyberattacks and their implications.

  • Explore future trends in cybersecurity, including AI-powered tools and blockchain technology.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

October 2025

Assessments

19 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 18 modules in this course

In this module, we will trace the evolution of cyber threats from early malware to today’s AI-accelerated campaigns, map the current cybersecurity landscape by highlighting adversary behaviors and defensive advances, and surface the biggest challenges and opportunities shaping strategic decision-making this year.

What's included

3 videos

In this module, we will unpack how adversaries weaponize AI for phishing, evasion, and exploitation, assess the operational and business impacts of AI-enabled malware campaigns, and translate insights into concrete countermeasures across people, process, and technology.

What's included

3 videos1 assignment1 plugin

In this module, we will examine AI’s role in crafting and distributing persuasive, deceptive content, explore detection frameworks, signals, and response playbooks for IO threats, and debate ethics while forecasting how AI will reshape global information conflicts.

What's included

4 videos1 assignment1 plugin

In this module, we will look ahead at AI’s evolution and its impact on security operations, dive into proactive detection, response orchestration, and autonomous workflows, and anticipate what’s next for AI in cybersecurity—and how to prepare.

What's included

4 videos1 assignment1 plugin

In this module, we will survey the landscape of state-sponsored cyber operations, study how the “Big Four” execute campaigns and the strategic goals they pursue, and convert lessons from real incidents into actionable defensive models.

What's included

3 videos1 assignment1 plugin

In this module, we will connect doctrine to operations—from Ukraine-driven shifts to global campaigns—dissect attacks on critical infrastructure, government, and public opinion, and identify defenses that blunt espionage, influence ops, and covert proxies.

What's included

6 videos1 assignment1 plugin

In this module, we will map the PLA’s cyber force, investments, and global posture, walk through emblematic intrusions including the Digital Silk Road and censorship as power, and explore future scenarios from arms-race dynamics to governance pathways.

What's included

10 videos1 assignment1 plugin

In this module, we will chart Iran’s journey from early operations to post-Stuxnet acceleration, analyze targeting patterns across energy and finance alongside influence operations, and examine present-day conflict spillovers and adaptive tactics under pressure.

What's included

6 videos1 assignment1 plugin

In this module, we will trace North Korea’s path to cyber power and monetization strategies, unpack landmark supply chain compromises and revenue-generation hacks, and look ahead at sanctions-driven adaptation and next-phase AI-powered operations.

What's included

7 videos1 assignment1 plugin

In this module, we will spotlight the high-stakes dynamics defining cybersecurity in 2025, break down trends and vulnerabilities alongside macro forces shaping attacker behavior, and convert insights into readiness plans, workforce skills, and resilient architectures.

What's included

14 videos1 assignment1 plugin

In this module, we will examine how infostealers infiltrate, persist, and siphon sensitive data, explore the underground economy that fuels accessibility and scale, and outline practical safeguards and incident handling for this fast-evolving threat.

What's included

9 videos1 assignment1 plugin

In this module, we will redefine perimeter thinking for hybrid work and distributed systems, study real breaches to expose weaknesses in authentication, access, and session management, and operationalize best practices for identity protection and future-ready IAM.

What's included

9 videos1 assignment1 plugin

In this module, we will explore the widening access to advanced offensive capabilities, trace the shift from lone actors to syndicates fueled by marketplaces and AI, and build a blueprint for smarter defenses that scale with the threat.

What's included

9 videos1 assignment1 plugin

In this module, we will clarify roles, risks, and controls unique to cloud operations, detail patterns for monitoring, incident handling, and encryption at scale, and weave identity, automation, and application security into day-two operations.

What's included

10 videos1 assignment1 plugin

In this module, we will translate regulatory requirements into actionable cloud practices, compare frameworks, certifications, and shared responsibility in compliance, and explore tooling and governance models that reduce cost and risk.

What's included

10 videos1 assignment1 plugin

In this module, we will introduce Web3’s architecture and the threat contours it creates, dissect famous exploits including DeFi rug pulls and cross-chain bridge failures, and share actionable safeguards for builders, exchanges, and end users.

What's included

11 videos1 assignment1 plugin

In this module, we will survey the threats most often realized in cloud environments, connect intel-driven monitoring with automated guardrails and verification, and convert breach retrospectives into concrete architectural improvements.

What's included

7 videos1 assignment1 plugin

In this module, we will map regulatory, geopolitical, and market forces across EMEA, examine ransomware, fraud, supply chain, and cloud-specific challenges, and highlight workforce initiatives and AI-driven innovations that are shaping regional defenses.

What's included

8 videos3 assignments

Instructor

Packt - Course Instructors
Packt
986 Courses238,111 learners

Offered by

Packt

Explore more from Computer Security and Networks

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions