• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerability Analysis

Results for "vulnerability analysis"


  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Cisco Learning and Certifications

    Data Security

    Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Cryptographic Protocols, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Security Controls, Event Monitoring, Continuous Monitoring, Threat Detection, Data Integrity

    ★ 4.8 (63) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity

    ★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Application Security Testing and Debugging

    Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Security Strategy, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Cyber Security Assessment, Test Automation, Vulnerability Management, Technical Communication

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    ★ 4 (7) · Beginner · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

    ★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Analyze, Create, and Secure Data with Zero Trust

    Skills you'll gain: Security Architecture Review, Investigation, Cyber Security Assessment, IT Security Architecture, Failure Analysis, Root Cause Analysis

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Analyze Capital, Basel, Stress Testing, and Resilience

    Skills you'll gain: Risk Management Framework, Cyber Governance, Financial Data, Financial Analysis, Performance Stress Testing, Governance Risk Management and Compliance, Financial Regulation, Business Continuity, Financial Systems, Data Management, Financial Market, Banking, Capital Markets, Regulatory Requirements

    Mixed · Course · 1 - 3 Months

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Pentesting APIs

    Skills you'll gain: Secure Coding, API Testing, API Design, Application Programming Interface (API), Security Testing, Penetration Testing, Application Security, Restful API, Authentications, Exploit development, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Scenario Testing, Security Controls, Development Environment, Cybersecurity

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • P

    Packt

    TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)

    Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Malware Protection, Network Analysis, Encryption

    Intermediate · Course · 3 - 6 Months

    Category: Credit offered
    Credit offered
1…456…834

In summary, here are 10 of our most popular vulnerability analysis courses

  • Penetration Testing and Vulnerability Scanning: Edureka
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Data Security: Cisco Learning and Certifications
  • Advanced System Security Design: University of Colorado System
  • Application Security Testing and Debugging: Starweaver
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Identifying Security Vulnerabilities: University of California, Davis
  • Analyze, Create, and Secure Data with Zero Trust: Coursera
  • Analyze Capital, Basel, Stress Testing, and Resilience: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok