• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Mitigating Vulnerabilities Using Packet Capture And Analysis

Results for "mitigating vulnerabilities using packet capture and analysis"


  • Status: Free Trial
    Free Trial
    P

    Pearson

    (SSCP) Systems Security Certified Practitioner: Unit 4

    Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Cyber Risk, Anomaly Detection

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities in C/C++Programming

    Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption

    4.6
    Rating, 4.6 out of 5 stars
    ·
    81 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Security Management, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, Cloud API, IT Automation, Event Monitoring, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Wireshark for Packet Capture: Analyze web traffic

    Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, Network Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    6 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • P

    Packt

    Cisco CyberOps Associate (200-201)

    Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Security Controls, Cyber Attacks, Incident Response, Digital Forensics, Risk Management Framework, Exploitation techniques, Network Security, Threat Management, Computer Security Incident Management, Network Monitoring, Event Monitoring, Network Analysis, Firewall, Data Integrity

    5
    Rating, 5 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection: Unit 1

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, Cybersecurity, Cyber Attacks, Real-Time Operating Systems, Internet Of Things

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Endpoint Detection and Response Essentials

    Skills you'll gain: Endpoint Detection and Response, Endpoint Security, Threat Detection, Malware Protection, Exploitation techniques, Cyber Security Strategy, Cybersecurity, Incident Response, IT Security Architecture, AI Integrations, AI Security, Cyber Attacks, Security Controls, Network Security, Cyber Security Assessment, Mobile Security, ChatGPT, Operating Systems

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    N

    New York University

    Real-Time Cyber Threat Detection and Mitigation

    Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Security Controls, Enterprise Security, Network Protocols, Proxy Servers

    4.7
    Rating, 4.7 out of 5 stars
    ·
    662 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection: Unit 4

    Skills you'll gain: Cybersecurity, IT Security Architecture, Security Architecture Review, Network Security, Cyber Security Strategy, Data Security, Security Controls, Threat Management, Security Strategy, Vulnerability Management, Incident Response, Vulnerability Assessments, Data Integrity, Risk Management Framework

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Secure Against Network Intrusions

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Computer Security Incident Management, Vulnerability Management, Exploitation techniques

    4.9
    Rating, 4.9 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

1234…834

In summary, here are 10 of our most popular mitigating vulnerabilities using packet capture and analysis courses

  • (SSCP) Systems Security Certified Practitioner: Unit 4: Pearson
  • Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Certified Ethical Hacker (CEH): Unit 4: Pearson
  • Wireshark for Packet Capture: Analyze web traffic: Coursera
  • Cisco CyberOps Associate (200-201): Packt
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Cybersecurity Prevention and Detection: Unit 1: Pearson
  • Endpoint Detection and Response Essentials: Packt
  • Real-Time Cyber Threat Detection and Mitigation: New York University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok