• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Owasp Vulnerability Handling

Results for "owasp vulnerability handling"


  • Status: Preview
    Preview
    F

    Fred Hutchinson Cancer Center

    Best Practices for Ethical Data Handling

    Skills you'll gain: Data Ethics, Data Sharing, Personally Identifiable Information, Clinical Research Ethics, Institutional Review Board (IRB), Healthcare Ethics, Data Security, Data Governance, Information Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Informed Consent, Encryption

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Incident Response and Defense with OpenVAS

    Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing

    5
    Rating, 5 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Web Security, Social Engineering & External Attacks

    Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Handling Security Incidents Across Domains

    Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Minnesota

    Cloud Application Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Distributed Denial-Of-Service (DDoS) Attacks, Web Services

    4.3
    Rating, 4.3 out of 5 stars
    ·
    27 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    App Deployment, Security & Infrastructure Automation

    Skills you'll gain: Open Web Application Security Project (OWASP), CI/CD, Application Deployment, DevOps, Continuous Integration, Ansible, Docker (Software), Continuous Deployment, Cloud Infrastructure, Platform As A Service (PaaS), Infrastructure As A Service (IaaS), Application Security, Cloud Computing, Containerization, Bash (Scripting Language), Web Applications, Firewall, Automation, Unit Testing

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Handling Difficult Conversations

    Skills you'll gain: Conflict Management, Assertiveness, Leadership, Professionalism, Interpersonal Communications, De-escalation Techniques, Emotional Intelligence, People Management, Communication, Constructive Feedback, Empathy

    5
    Rating, 5 out of 5 stars
    ·
    10 reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2

    Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management, Security Strategy

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Metasploit for Beginners: Ethical Penetration Testing

    Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    69 reviews

    Beginner · Guided Project · Less Than 2 Hours

1…789…100

In summary, here are 10 of our most popular owasp vulnerability handling courses

  • Best Practices for Ethical Data Handling: Fred Hutchinson Cancer Center
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
  • Incident Response and Defense with OpenVAS: IBM
  • Web Security, Social Engineering & External Attacks: Packt
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Handling Security Incidents Across Domains: Packt
  • Cloud Application Security: University of Minnesota
  • App Deployment, Security & Infrastructure Automation: Packt
  • Handling Difficult Conversations: Packt
  • Cyber Secure Coder (CSC-110) : Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok