• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Vulnerability

Results for "vulnerability"


  • Status: New
    New
    P

    Packt

    Securing Industrial Control and Safety Instrumented Systems

    Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Security Controls, Security Engineering, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Cyber Governance, Industrial Design, Emerging Technologies

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Ciberseguridad

    Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    511 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Bitcoin Threats & Future Security

    Skills you'll gain: Threat Modeling, Security Testing, Security Engineering, Cybersecurity, Data Security, Blockchain, Threat Detection, Cryptography, Network Security, Security Strategy, Exploit development, Vulnerability Assessments, Transaction Processing, Regulation and Legal Compliance

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Introduction to Cybersecurity Essentials

    Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Basics of Cyber Threat Intelligence

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Assurance, Security Controls, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Risk Management Framework, Technical Communication, Vulnerability Assessments, Data Integrity, Automation

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Advanced Strategic Threat Intelligence Research & Reporting

    Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Business Writing, Risk Analysis, Communication, Presentations, Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Bitcoin Security Foundations

    Skills you'll gain: Blockchain, Cryptography, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Public Key Cryptography Standards (PKCS), Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Verification And Validation

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Securing AI Systems

    Skills you'll gain: Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Security Controls, Information Systems Security, Artificial Intelligence and Machine Learning (AI/ML), Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Hardening, Threat Detection, Artificial Intelligence, Penetration Testing, Machine Learning

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Securing the Assets: Bitcoin Security

    Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Security Testing, Security Engineering, Threat Management, Cybersecurity, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Assessments, Public Key Infrastructure, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    775 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity Risk Management Frameworks

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

    4.7
    Rating, 4.7 out of 5 stars
    ·
    198 reviews

    Beginner · Specialization · 3 - 6 Months

Searches related to vulnerability

vulnerability scanning with nmap: network scanning
vulnerability types and concepts
cloud security, resiliency, and vulnerability management
1…151617…41

In summary, here are 10 of our most popular vulnerability courses

  • Securing Industrial Control and Safety Instrumented Systems: Packt
  • Ciberseguridad: Universidad de los Andes
  • Bitcoin Threats & Future Security : AI CERTs
  • Introduction to Cybersecurity Essentials: IBM
  • Basics of Cyber Threat Intelligence: Starweaver
  • Advanced Strategic Threat Intelligence Research & Reporting: Starweaver
  • Bitcoin Security Foundations : AI CERTs
  • Securing AI Systems: Edureka
  • Securing the Assets: Bitcoin Security: AI CERTs
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok