• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Os Vulnerability Exploitation And Mitigation

Results for "os vulnerability exploitation and mitigation"


  • Status: Free Trial
    Free Trial
    U

    University of London

    Introduction to Network Security

    Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing

    4.9
    Rating, 4.9 out of 5 stars
    ·
    27 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    App Deployment, Security & Infrastructure Automation

    Skills you'll gain: Open Web Application Security Project (OWASP), CI/CD, Application Deployment, DevOps, Continuous Integration, Ansible, Docker (Software), Continuous Deployment, Cloud Infrastructure, Platform As A Service (PaaS), Infrastructure As A Service (IaaS), Application Security, Cloud Computing, Containerization, Bash (Scripting Language), Web Applications, Firewall, Automation, Unit Testing

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Securing Linux Systems

    Skills you'll gain: Virtual Private Networks (VPN), Linux Administration, Public Key Infrastructure, Linux, Intrusion Detection and Prevention, Firewall, Remote Access Systems, Authentications, Authorization (Computing), Network Security, Security Controls, Identity and Access Management, File Management, Systems Administration, Cybersecurity, Encryption, Information Technology, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    112 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication

    5
    Rating, 5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    IBM z/OS Mainframe Practitioner

    Skills you'll gain: Job Control Language (JCL), Mainframe Computing, z/OS, Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Hardware Architecture, Data Storage, Operating System Administration, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, Linux, Control Panels, Command-Line Interface

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.3K reviews

    Intermediate · Professional Certificate · 1 - 3 Months

  • Status: Preview
    Preview
    I

    IBM

    IBM z/OS Rexx Programming

    Skills you'll gain: Debugging, z/OS, Job Control Language (JCL), Mainframe Computing, Scripting Languages, Computer Programming, Program Development, Data Structures, Command-Line Interface, Data Management, Application Development

    4.4
    Rating, 4.4 out of 5 stars
    ·
    25 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Windows OS Forensics

    Skills you'll gain: File Systems, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, System Software, Data Integrity, Data Storage

    4.7
    Rating, 4.7 out of 5 stars
    ·
    80 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Core 2: OS, Software, Security and Operational Procedures

    Skills you'll gain: Operating Systems, Network Security, Network Support, Network Troubleshooting, System Support, Data Storage, Microsoft Windows, Systems Administration, Mac OS, Technical Support, System Configuration, Command-Line Interface, Software Installation, Linux, Help Desk Support, Encryption, Mobile Security, Information Technology, Firewall, Malware Protection

    4.7
    Rating, 4.7 out of 5 stars
    ·
    69 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    University of Cape Town

    Climate Change Mitigation in Developing Countries

    Skills you'll gain: Climate Change Mitigation, Sustainable Development, Economic Development, Environmental Policy, Policy Development, Mathematical Modeling, Systems Thinking, Complex Problem Solving, Research, Innovation, Stakeholder Engagement

    4.7
    Rating, 4.7 out of 5 stars
    ·
    593 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    E

    EDUCBA

    OpenSUSE Linux OS Fundamentals

    Skills you'll gain: Command-Line Interface, Linux, Package and Software Management, Linux Administration, Unix Commands, File Management, Operating System Administration, Linux Commands, Systems Administration, File Systems, Open Source Technology, System Configuration, Software Installation, Operating Systems, Virtualization, User Interface (UI)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Council on Foreign Relations

    Climate Change: Mitigation and Adaptation

    Skills you'll gain: Climate Change Adaptation, Climate Change Mitigation, Energy and Utilities, Social Justice, Environmental Issue, Sustainable Development, Environmental Policy, Emerging Technologies, Environment, Sustainable Technologies, Artificial Intelligence

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Threat Vectors and Mitigation

    Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    309 reviews

    Beginner · Course · 1 - 3 Months

1…91011…834

In summary, here are 10 of our most popular os vulnerability exploitation and mitigation courses

  • Introduction to Network Security: University of London
  • App Deployment, Security & Infrastructure Automation: Packt
  • Securing Linux Systems: LearnQuest
  • Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
  • IBM z/OS Mainframe Practitioner: IBM
  • IBM z/OS Rexx Programming: IBM
  • Windows OS Forensics: Infosec
  • Core 2: OS, Software, Security and Operational Procedures: IBM
  • Climate Change Mitigation in Developing Countries: University of Cape Town
  • OpenSUSE Linux OS Fundamentals: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok