• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Owasp Vulnerability Handling

Results for "owasp vulnerability handling"


  • G

    Georgetown University

    Bachelor of Arts in Liberal Studies

    Skills you'll gain: Vulnerability Assessments, Operations Management, Data Storytelling, Business Strategy, Design Thinking, Competitive Intelligence, Survey Creation, Cyber Threat Intelligence, Machine Learning Methods, Social Justice, Descriptive Statistics, Environment, Business Ethics, Capital Budgeting, Market Opportunities, Storytelling, Marketing Planning, International Relations, Policy Development, Political Sciences

    Earn a degree

    Degree · 1 - 4 Years

  • Status: Free Trial
    Free Trial
    P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface

    Advanced · Course · 1 - 3 Months

  • G

    Google Cloud

    Automating Response to Phishing with Cortex XSOAR

    Skills you'll gain: Incident Response, Email Security, Incident Management, Computer Security Incident Management, Cyber Operations, Threat Detection, IT Automation, Google Cloud Platform

    Intermediate · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Resilient Solutions and Security Controls

    Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Coursera

    Demystifying Oracle Cloud Infrastructure (OCI) Security

    Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    The GRC Approach to Managing Cybersecurity

    Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Risk Management Framework, Continuous Monitoring, Security Controls, Enterprise Security, Information Privacy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    362 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows

    4.5
    Rating, 4.5 out of 5 stars
    ·
    94 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Managing Incident Response, IAM, and AWS Service Security

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Information and Event Management (SIEM), Security Management, Computer Security Incident Management, Incident Response, Amazon CloudWatch, Application Security, Amazon Elastic Compute Cloud, Amazon S3, Data Access, Multi-Factor Authentication, Configuration Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Microsoft Security Solutions Capabilities

    Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Python for Cybersecurity

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    540 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Managing Cybersecurity Incidents and Disasters

    Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    250 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication

    5
    Rating, 5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

1…979899100

In summary, here are 10 of our most popular owasp vulnerability handling courses

  • Bachelor of Arts in Liberal Studies: Georgetown University
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Automating Response to Phishing with Cortex XSOAR: Google Cloud
  • AWS: Resilient Solutions and Security Controls: Whizlabs
  • Demystifying Oracle Cloud Infrastructure (OCI) Security: Coursera
  • The GRC Approach to Managing Cybersecurity: Kennesaw State University
  • Execution, persistence, privilege escalation and evasion: Infosec
  • Managing Incident Response, IAM, and AWS Service Security: Packt
  • Microsoft Security Solutions Capabilities: Whizlabs
  • Python for Cybersecurity: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok