• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Vulnerability Computing

Results for "vulnerability (computing)"


  • Status: Free Trial
    Free Trial
    B

    Board Infinity

    Building RESTful APIs with Node.js and Express

    Skills you'll gain: Node.JS, MongoDB, Middleware, Databases, Authorization (Computing), Authentications, Data Validation

    4.6
    Rating, 4.6 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Mastering Software Development in R Capstone

    Skills you'll gain: Software Documentation, Leaflet (Software), Technical Documentation, Data Manipulation, Data Cleansing, Data Transformation, Data Visualization Software, Code Review, R Programming, GitHub, Continuous Integration, Software Testing

    4
    Rating, 4 out of 5 stars
    ·
    44 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Security and Authentication

    Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    B

    Board Infinity

    Building a Complete MEAN Stack Application

    Skills you'll gain: Node.JS, Full-Stack Web Development, User Interface (UI), Application Deployment, MongoDB, Angular, Back-End Web Development, Front-End Web Development, User Interface (UI) Design, Web Applications, JavaScript Frameworks, Restful API, Web Development, Secure Coding, Authentications, Authorization (Computing), Scalability

    4.1
    Rating, 4.1 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Deployment in GCP

    Skills you'll gain: Infrastructure as Code (IaC), Google Cloud Platform, Application Deployment, Kubernetes, Google App Engine, CI/CD, Terraform, Continuous Deployment, Microservices, Cloud-Native Computing, Continuous Integration, Cloud Storage, Containerization, Security Strategy, Docker (Software), DevOps, Network Troubleshooting, Virtual Machines, System Monitoring, Analytics

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    DDoS Attacks and Defenses

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Security Engineering, Network Security, Threat Detection, Firewall, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things

    4.5
    Rating, 4.5 out of 5 stars
    ·
    171 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    N

    National Taiwan University

    人工智慧:機器學習與理論基礎 (Artificial Intelligence - Learning & Theory)

    Skills you'll gain: Reinforcement Learning, Deep Learning, Theoretical Computer Science, Artificial Neural Networks, Artificial Intelligence, Machine Learning, Computational Logic, Supervised Learning, Computer Science, Decision Tree Learning, Unsupervised Learning, Algorithms

    4.6
    Rating, 4.6 out of 5 stars
    ·
    62 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    NIST DoD RMF

    Skills you'll gain: Risk Management Framework, Systems Development Life Cycle, Risk Management, NIST 800-53, Enterprise Risk Management (ERM), Operational Risk, Governance Risk Management and Compliance, Continuous Monitoring, Law, Regulation, and Compliance, Regulatory Requirements, Cyber Security Policies, Security Controls, Authorization (Computing), Cyber Security Assessment

    4.5
    Rating, 4.5 out of 5 stars
    ·
    50 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Managing Security in Google Cloud Platform 日本語版

    Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Cloud Computing, Security Management, Network Security, Virtual Private Networks (VPN), Firewall, Role-Based Access Control (RBAC), Public Cloud, Security Controls, Load Balancing

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data Security and Information Privacy

    Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    A

    Arizona State University

    Selective Laser Sintering and Metal Laser Powder Bed Fusion

    Skills you'll gain: Manufacturing Processes, Equipment Design, Manufacturing and Production, Systems Of Measurement, Process Analysis, Process Control, Materials science, Laboratory Testing, Safety Training

    4.9
    Rating, 4.9 out of 5 stars
    ·
    24 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture

    3.7
    Rating, 3.7 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

1…152153154…358

In summary, here are 10 of our most popular vulnerability (computing) courses

  • Building RESTful APIs with Node.js and Express: Board Infinity
  • Mastering Software Development in R Capstone: Johns Hopkins University
  • Security and Authentication: Microsoft
  • Building a Complete MEAN Stack Application: Board Infinity
  • Deployment in GCP: LearnKartS
  • DDoS Attacks and Defenses: University of Colorado System
  • 人工智慧:機器學習與理論基礎 (Artificial Intelligence - Learning & Theory): National Taiwan University
  • NIST DoD RMF: Infosec
  • Managing Security in Google Cloud Platform 日本語版: Google Cloud
  • Cyber Security: Data Security and Information Privacy: Macquarie University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok