• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerability

Results for "vulnerability"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    The Complete Pentesting and Privilege Escalation Course

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Bash (Scripting Language), Microsoft Windows, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Getting Started in Port Scanning Using Nmap and Kali Linux

    Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EDUCBA

    Developing Secure IoT Applications

    Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Vulnerability Assessments

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    S

    SAE Institute México

    Ethical Hacking

    Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Software Architecture, Security Engineering, Software Design, Microsoft Azure, Cybersecurity, DevOps, Kubernetes, Infrastructure as Code (IaC), Web Applications, Azure DevOps, Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Dependency Analysis, Git (Version Control System)

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Blockchain Security - Foundational Concepts

    Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Security Engineering, Network Security, Cryptography, Vulnerability Assessments, Encryption, Transaction Processing, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Scalability

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Security and Auditing in Ethereum

    Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Protection of Information Assets

    Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Incident Response and Risk Management

    Skills you'll gain: Computer Security Incident Management, Digital Forensics, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Threat Management, Risk Management, Security Strategy, Network Security, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Intro to IoT Pentesting

    Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface

    Beginner · Course · 1 - 3 Months

Searches related to vulnerability

vulnerability management
vulnerability assessment
vulnerability scanning with nmap: network scanning
vulnerability scanning
vulnerability types and concepts
vulnerability assessment and penetration testing
cloud security, resiliency, and vulnerability management
1…333435…43

In summary, here are 10 of our most popular vulnerability courses

  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • The Complete Pentesting and Privilege Escalation Course: Packt
  • Certified Ethical Hacker (CEH): Unit 4: Pearson
  • Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
  • Developing Secure IoT Applications: EDUCBA
  • Ethical Hacking: SAE Institute México
  • Cyber Security: DevSecOps: Macquarie University
  • Blockchain Security - Foundational Concepts: LearnQuest
  • Security and Auditing in Ethereum: EDUCBA
  • Protection of Information Assets: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok