• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Scanning

Results for "scanning"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Generative AI and LLM Security

    Skills you'll gain: Responsible AI, Data Ethics, Threat Modeling, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    C

    Coursera

    Metasploit para Principiantes: Básicos de explotación

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    SkillUp

    Network Traffic Analysis with Wireshark

    Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments

    5
    Rating, 5 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    CISSP Domain 6: Security Assessment and Testing

    Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials: Hands-On Edition

    Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    JFrog DevOps: Secure Software Pipelines & CI/CD Mastery

    Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, Vulnerability Assessments, DevOps, GitHub, Automation

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Indian Institute of Science

    Sensors and Systems for Biomedical Applications

    Skills you'll gain: Biomedical Technology, Biomedical Engineering, Medical Devices, Medical Equipment and Technology, Vital Signs, Chemistry, ISO 13485 Standard, Materials science, Analytical Chemistry, Diagnostic Tests, Molecular Biology, Biology, Electocardiography, Neurology, Electronics, Artificial Intelligence, Oncology

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    Simplilearn

    Generative AI Course in Software Testing and Documentation

    Skills you'll gain: Software Documentation, Test Automation, Generative AI, Software Testing, Vulnerability Scanning, Vulnerability Assessments, Test Case, Security Testing, Secure Coding, Full-Stack Web Development, Technical Documentation, Natural Language Processing

    4
    Rating, 4 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Ethical Hacking with Kali Linux

    Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    42 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    Nmap

    Skills you'll gain: Vulnerability Scanning, Network Security, Network Administration, Network Protocols, Network Analysis, TCP/IP, File Transfer Protocol (FTP), Software Installation, Ubuntu, Command-Line Interface, Open Source Technology

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Nmap for Penetration Testing: From Beginner to Advanced

    Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration

    Intermediate · Course · 1 - 3 Months

Searches related to scanning

scanning user-generated content using the cloud video intelligence and cloud vision apis
vulnerability scanning with nmap: network scanning
getting started in port scanning using nmap and kali linux
nessus scanner - network scanning from beginner to advanced
scaling product and processes
greedy algorithms, minimum spanning trees, and dynamic programming
bitcoin scaling & security
scaling operations: linking strategy and execution
1…567…20

In summary, here are 10 of our most popular scanning courses

  • Generative AI and LLM Security : Edureka
  • Metasploit para Principiantes: Básicos de explotación: Coursera
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Network Traffic Analysis with Wireshark: SkillUp
  • CISSP Domain 6: Security Assessment and Testing: Infosec
  • Ethical Hacking Essentials: Hands-On Edition: EC-Council
  • JFrog DevOps: Secure Software Pipelines & CI/CD Mastery: Coursera
  • Sensors and Systems for Biomedical Applications: Indian Institute of Science
  • Generative AI Course in Software Testing and Documentation: Simplilearn
  • Ethical Hacking with Kali Linux: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok