• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Owasp Vulnerability Handling

Results for "owasp vulnerability handling"


  • Status: Preview
    Preview
    C

    Coursera

    Demystifying Oracle Cloud Infrastructure (OCI) Security

    Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    The GRC Approach to Managing Cybersecurity

    Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Risk Management Framework, Continuous Monitoring, Security Controls, Enterprise Security, Information Privacy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    363 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows

    4.5
    Rating, 4.5 out of 5 stars
    ·
    95 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Managing Incident Response, IAM, and AWS Service Security

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Managing Cybersecurity Incidents and Disasters

    Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    251 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Implementing Open Policy Agent for Policy-Driven Control

    Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Open Source Technology, Cross Platform Development, Configuration Management, JSON

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Protecting and Managing APIs

    Skills you'll gain: API Gateway, Authentications, Application Programming Interface (API), OAuth, API Design, Cloud API, Authorization (Computing), Secure Coding, API Testing, Restful API, Threat Modeling, Application Security, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Encryption, Prometheus (Software), Flask (Web Framework), Grafana, Python Programming

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Python for Cybersecurity

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Endpoint Detection and Response, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Data Persistence, Scripting, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    544 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Network Security, Multi-Factor Authentication

    5
    Rating, 5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    EDUCBA

    Automated Cyber Security Incident Response

    Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework

    4.7
    Rating, 4.7 out of 5 stars
    ·
    69 reviews

    Beginner · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Responding to Post-Intrusion Ransomware with Cortex XSOAR

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Google Cloud Platform, Malware Protection, Threat Detection, Security Information and Event Management (SIEM)

    Intermediate · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Azure Cybersecurity Solutions And Microsoft Defender

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Virtual Machines, Encryption, Event Management

    Beginner · Course · 1 - 4 Weeks

1…108109110111

In summary, here are 10 of our most popular owasp vulnerability handling courses

  • Demystifying Oracle Cloud Infrastructure (OCI) Security: Coursera
  • The GRC Approach to Managing Cybersecurity: Kennesaw State University
  • Execution, persistence, privilege escalation and evasion: Infosec
  • Managing Incident Response, IAM, and AWS Service Security: Packt
  • Managing Cybersecurity Incidents and Disasters: Kennesaw State University
  • Implementing Open Policy Agent for Policy-Driven Control: Coursera
  • Protecting and Managing APIs: Edureka
  • Python for Cybersecurity: Infosec
  • Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
  • Automated Cyber Security Incident Response: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok