• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Vulnerability Scanning

Results for "vulnerability scanning"


  • Status: Free Trial
    Free Trial
    P

    Packt

    Network Implementations and Operations

    Skills you'll gain: Network Security, Disaster Recovery, Network Administration, Authentications, Vulnerability Assessments, Computer Networking, Network Infrastructure, Wireless Networks, Cybersecurity, Network Monitoring, Local Area Networks, Vulnerability Management, Telecommunications, Network Protocols, Network Switches, Network Routing, Communication Systems, Cryptography, Encryption

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Ethical Hacking Foundations

    Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cyber Security Assessment, Cybersecurity, Data Ethics, Computer Networking, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines

    4.3
    Rating, 4.3 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    C

    Coursera

    للمبتدئين Metasploit: أساسيات الاستغلال

    Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    Simplilearn

    Generative AI in Software Engineering Certification

    Skills you'll gain: Amazon Bedrock, Software Documentation, Generative AI, Test Automation, Mockups, User Interface (UI), Software Development Tools, User Interface and User Experience (UI/UX) Design, Usability, Software Testing, Vulnerability Scanning, Application Security, Maintainability, Prompt Engineering, Test Case, Software Architecture, Code Review, Secure Coding, Artificial Intelligence, Debugging

    3.5
    Rating, 3.5 out of 5 stars
    ·
    10 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Gemini for Security Engineers

    Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Vulnerability Management, Security Engineering, Threat Detection

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Coursera

    Metasploit para Principiantes: Básicos de explotación

    Skills you'll gain: Metasploit, Exploitation techniques, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    CISSP Crash Course

    Skills you'll gain: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Risk Management, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Cryptography

    4.3
    Rating, 4.3 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    G

    Google

    Office of the CISO Institute: Cybersecurity Essentials

    Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Network Security, Application Security, Governance Risk Management and Compliance, Cloud Security, Risk Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    78 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    A General Approach to Risk Management

    Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process

    4.9
    Rating, 4.9 out of 5 stars
    ·
    45 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Software Design Threats and Mitigations

    Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)

    4.6
    Rating, 4.6 out of 5 stars
    ·
    94 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

    3.8
    Rating, 3.8 out of 5 stars
    ·
    16 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Linux for Security Experts

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

Searches related to vulnerability scanning

vulnerability scanning with nmap: network scanning
1…202122…40

In summary, here are 10 of our most popular vulnerability scanning courses

  • Network Implementations and Operations: Packt
  • Ethical Hacking Foundations: Packt
  • للمبتدئين Metasploit: أساسيات الاستغلال : Coursera
  • Generative AI in Software Engineering Certification: Simplilearn
  • Gemini for Security Engineers: Google Cloud
  • Metasploit para Principiantes: Básicos de explotación: Coursera
  • CISSP Crash Course: Packt
  • Office of the CISO Institute: Cybersecurity Essentials: Google
  • A General Approach to Risk Management: Kennesaw State University
  • Software Design Threats and Mitigations: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok