• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Network Vulnerability

Results for "network vulnerability"


  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Object Oriented Java Programming: Data Structures and Beyond

    Skills you'll gain: Unit Testing, Growth Mindedness, Data Structures, Graph Theory, Event-Driven Programming, Social Network Analysis, Interactive Data Visualization, Java, Java Programming, Network Analysis, Object Oriented Programming (OOP), Technical Communication, User Interface (UI), Object Oriented Design, Computer Programming, Willingness To Learn, Adaptability, Performance Tuning, Algorithms, Problem Solving

    4.7
    Rating, 4.7 out of 5 stars
    ·
    7.2K reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    IT Fundamentals for Cybersecurity

    Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Data Ethics, Cyber Attacks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    22K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    CompTIA CySA+ (CS0-003)

    Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Specialization · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    ISC2

    Certified in Cybersecurity

    Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Networking Services and Routing

    Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Routing Protocols, Network Routing, Network Routers, Virtual Private Networks (VPN), TCP/IP, Network Protocols, General Networking, Network Security

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Cybersecurity Operations Fundamentals

    Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    27 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Ethical Hacking - Capture the Flag Walkthroughs - v2

    Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity

    Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Infrastructure, Firewall, Network Infrastructure, Docker (Software), Virtual Private Networks (VPN), Software As A Service, Hybrid Cloud Computing, Containerization, Threat Detection, Data Centers, Threat Management, OSI Models, Enterprise Security, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Vulnerability Scanning, Incident Response

    4.6
    Rating, 4.6 out of 5 stars
    ·
    853 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: Preview
    Preview
    B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    229 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    I

    IBM

    IBM Deep Learning with PyTorch, Keras and Tensorflow

    Skills you'll gain: PyTorch (Machine Learning Library), Keras (Neural Network Library), Deep Learning, Reinforcement Learning, Unsupervised Learning, Artificial Neural Networks, Machine Learning Methods, Generative AI, Tensorflow, Artificial Intelligence and Machine Learning (AI/ML), Image Analysis, Computer Vision, Statistical Modeling, Artificial Intelligence, Geospatial Information and Technology, Machine Learning, Regression Analysis, Data Pipelines, Network Architecture, Network Model

    4.5
    Rating, 4.5 out of 5 stars
    ·
    4.1K reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    M

    Microsoft

    Microsoft Cybersecurity Analyst

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    2.9K reviews

    Beginner · Professional Certificate · 3 - 6 Months

Searches related to network vulnerability

vulnerability scanning with nmap: network scanning
1…333435…318

In summary, here are 10 of our most popular network vulnerability courses

  • Object Oriented Java Programming: Data Structures and Beyond: University of California San Diego
  • IT Fundamentals for Cybersecurity: IBM
  • CompTIA CySA+ (CS0-003): Packt
  • Certified in Cybersecurity: ISC2
  • Advanced Networking Services and Routing: Packt
  • Cybersecurity Operations Fundamentals: Cisco Learning and Certifications
  • Certified Ethical Hacker (CEH) v.12: Packt
  • Ethical Hacking - Capture the Flag Walkthroughs - v2: Packt
  • Palo Alto Networks Cybersecurity: Palo Alto Networks
  • Kali Linux: Board Infinity

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok