• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Vulnerability

Results for "vulnerability"


  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: Protecting your Information at Home

    Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    35 reviews

    Beginner · Course · 1 - 3 Months

  • S

    SAE Institute México

    Bulletproof 2. Networking Autopsy

    Skills you'll gain: Professional Networking, Relationship Building, Resilience, Collaboration, Growth Mindedness, Courage, Overcoming Obstacles, Adaptability, Empathy, Open Mindset, Interpersonal Communications, Communication

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    The Beginners Cyber Security Awareness Training Course

    Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management

    Beginner · Course · 3 - 6 Months

  • K

    Kennesaw State University

    An Employee's Guide to Cybersecurity

    Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Network Security, Security Awareness, Remote Access Systems, Mobile Security, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: GRC Part 2 - Risk Management and Compliance

    Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    University of Illinois Urbana-Champaign

    Empathy, Data, and Risk

    Skills you'll gain: Data Visualization, Data Visualization Software, Empathy, Data Storytelling, Interactive Data Visualization, Risk Analysis, Data-Driven Decision-Making, Data Analysis, Risk Management, Stakeholder Analysis, Analytical Skills, Human Centered Design, Decision Making, User Research, Risk Control, Psychology

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    What Is Cybersecurity?

    Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    16 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Microsoft Security Solutions Capabilities

    Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and the X-Factor

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    260 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Codio

    Web Technologies and Security

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming

    4.4
    Rating, 4.4 out of 5 stars
    ·
    99 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Homeland Security and Cybersecurity

    Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    630 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    Illinois Tech

    Security: A Comprehensive Approach

    Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    31 reviews

    Intermediate · Specialization · 3 - 6 Months

Searches related to vulnerability

vulnerability scanning with nmap: network scanning
vulnerability types and concepts
cloud security, resiliency, and vulnerability management
1…38394041

In summary, here are 10 of our most popular vulnerability courses

  • Cybersecurity: Protecting your Information at Home: Kennesaw State University
  • Bulletproof 2. Networking Autopsy: SAE Institute México
  • The Beginners Cyber Security Awareness Training Course: Packt
  • An Employee's Guide to Cybersecurity: Kennesaw State University
  • Cyber Security: GRC Part 2 - Risk Management and Compliance: Macquarie University
  • Empathy, Data, and Risk: University of Illinois Urbana-Champaign
  • What Is Cybersecurity?: Kennesaw State University
  • Microsoft Security Solutions Capabilities: Whizlabs
  • Cybersecurity and the X-Factor: Kennesaw State University
  • Web Technologies and Security: Codio

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok