• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerabilities

Results for "vulnerabilities"


  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    M

    Microsoft

    Microsoft Cybersecurity Analyst

    Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Security, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pragmatic AI Labs

    LLM Security and Vulnerabilities

    Skills you'll gain: LLM Application, Large Language Modeling, Open Web Application Security Project (OWASP), AI Security, Cyber Security Assessment, Application Security, Security Architecture Review, Tool Calling, Threat Modeling, Security Testing, Secure Coding, Vulnerability Assessments, Vulnerability Management, Software Architecture, Prompt Patterns, Prompt Engineering, IT Security Architecture, Security Controls, Application Programming Interface (API), Data Validation

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    191 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Google Network Security

    Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Network Infrastructure, Cyber Attacks, Computer Security Incident Management, Operating Systems, Linux, Bash (Scripting Language), Databases

    4.8
    Rating, 4.8 out of 5 stars
    ·
    72 reviews

    Beginner · Specialization · 3 - 6 Months

What brings you to Coursera today?

  • Status: New
    New
    Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security & Compliance on Google Cloud

    Skills you'll gain: AI Security, Security Information and Event Management (SIEM), DevSecOps, Role-Based Access Control (RBAC), Responsible AI, Data Security, Security Strategy, Cloud Deployment, Vulnerability Management, Vulnerability Scanning, Security Management, Continuous Monitoring, Cybersecurity, Cloud Security, Vulnerability Assessments, Threat Modeling, Threat Detection, Incident Response, Security Software, Operations

    4.5
    Rating, 4.5 out of 5 stars
    ·
    22 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Secure Coding for Application Development

    Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Vulnerability Assessments, Cyber Security Assessment, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls

    4
    Rating, 4 out of 5 stars
    ·
    600 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    251 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    CISSP Certified Information Systems Security Professional

    Skills you'll gain: Identity and Access Management, Business Continuity, Cryptographic Protocols, Network Security, Cryptography, Encryption, User Provisioning, Security Management, Penetration Testing, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, Cyber Operations, Data Management, Vulnerability Management, Software Development Methodologies, Cybersecurity, Configuration Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    157 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    I

    IBM

    IBM Cybersecurity Analyst

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Penetration Testing, Linux, Database Management, IT Security Architecture, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    27K reviews

    Beginner · Professional Certificate · 3 - 6 Months

1234…29

In summary, here are 10 of our most popular vulnerabilities courses

  • Assets, Threats, and Vulnerabilities: Google
  • Microsoft Cybersecurity Analyst: Microsoft
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • LLM Security and Vulnerabilities: Pragmatic AI Labs
  • IBM Ethical Hacking with Open Source Tools: IBM
  • Google Network Security: Google
  • Security & Compliance on Google Cloud: Google Cloud
  • Secure Coding for Application Development: Edureka
  • Fundamentals of Computer Network Security: University of Colorado System
  • Application Security for Developers and DevOps Professionals: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok