• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Owasp Vulnerability Handling

Results for "owasp vulnerability handling"


  • Status: Preview
    Preview
    U

    Universidad de Chile

    Costos para los Negocios

    Skills you'll gain: Cost Accounting, Operating Cost, Management Reporting, Small Business Accounting, Cost Management, Management Accounting, Cost Estimation, Financial Reporting, Business Reporting, Expense Management, Operating Expense, Inventory Accounting, Materials Management, Material Handling, Labor Compliance, Budgeting, Financial Accounting, Business Administration

    4.9
    Rating, 4.9 out of 5 stars
    ·
    2.9K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Incident Handling and Analysis Techniques

    Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Network Monitoring

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)

    3.6
    Rating, 3.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Web Application Security Testing with Google Hacking

    Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Compliance Framework, Standards & Regulations

    Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.4K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2

    Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management, Security Strategy

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Connect and Protect: Networks and Network Security

    Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    6.9K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Santa Cruz

    C and Go: Classical and Modern Programming

    Skills you'll gain: Go (Programming Language), Data Structures, C and C++, C (Programming Language), Programming Principles, Object Oriented Programming (OOP), Debugging, C++ (Programming Language), Computer Programming, Unit Testing, Integrated Development Environments, Computer Science, Pseudocode, Command-Line Interface, Algorithms, File Systems, Integration Testing, Software Design

    4.5
    Rating, 4.5 out of 5 stars
    ·
    7.2K reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    CyberSec First Responder (CFR-310)

    Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    Intermediate · Course · 1 - 3 Months

1…567…100

In summary, here are 10 of our most popular owasp vulnerability handling courses

  • Costos para los Negocios: Universidad de Chile
  • Advanced Incident Handling and Analysis Techniques: Packt
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Web Application Security Testing with Google Hacking: Packt
  • Cybersecurity Compliance Framework, Standards & Regulations: IBM
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2: Pearson
  • Advanced Penetration Techniques: Packt
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Connect and Protect: Networks and Network Security: Google
  • C and Go: Classical and Modern Programming: University of California, Santa Cruz

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok