• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Scanning

Results for "scanning"


  • P

    Packt

    Getting Started in Port Scanning Using Nmap and Kali Linux

    Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    SkillUp

    Network Traffic Analysis with Wireshark

    Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments

    5
    Rating, 5 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free
    Free
    C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    75 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    Simplilearn

    Generative AI Course in Software Testing and Documentation

    Skills you'll gain: Software Documentation, Test Automation, Generative AI, Software Testing, Vulnerability Scanning, Vulnerability Assessments, Test Case, Security Testing, Secure Coding, Full-Stack Web Development, Technical Documentation, Natural Language Processing

    4
    Rating, 4 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    Simplilearn

    Generative AI in Software Engineering Certification

    Skills you'll gain: Amazon Bedrock, Software Documentation, Generative AI, Test Automation, Mockups, User Interface (UI), Software Development Tools, User Interface and User Experience (UI/UX) Design, Usability, Software Testing, Vulnerability Scanning, Application Security, Maintainability, Prompt Engineering, Test Case, Software Architecture, Code Review, Secure Coding, Artificial Intelligence, Debugging

    3.5
    Rating, 3.5 out of 5 stars
    ·
    10 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Database Essentials and Vulnerabilities

    Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    57 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Pentesting Fundamentals for Beginners

    Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Coursera

    Metasploit para Principiantes: Básicos de explotación

    Skills you'll gain: Metasploit, Exploitation techniques, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Codio

    Tools for Security Specialists

    Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    66 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Fundamentals

    Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Security Assessment, Network Security, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Vulnerability Assessments, Application Security, Intrusion Detection and Prevention, Security Awareness, Web Servers

    4.6
    Rating, 4.6 out of 5 stars
    ·
    194 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to scanning

scanning user-generated content using the cloud video intelligence and cloud vision apis
vulnerability scanning with nmap: network scanning
getting started in port scanning using nmap and kali linux
nessus scanner - network scanning from beginner to advanced
scaling product and processes
greedy algorithms, minimum spanning trees, and dynamic programming
scaling and optimizing bgp
scaling with google cloud operations
1…456…20

In summary, here are 10 of our most popular scanning courses

  • Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
  • Network Traffic Analysis with Wireshark: SkillUp
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera
  • Generative AI Course in Software Testing and Documentation: Simplilearn
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Generative AI in Software Engineering Certification: Simplilearn
  • Database Essentials and Vulnerabilities: IBM
  • Pentesting Fundamentals for Beginners: Packt
  • Software Security for Web Applications: Codio
  • Metasploit para Principiantes: Básicos de explotación: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok