Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability (computing)"
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Databases, Computer Hardware, Relational Databases, File Systems, User Interface (UI), User Accounts
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
- Status: [object Object]
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Unit Testing, Object-Relational Mapping, Cloud Computing Architecture, Server Side, Application Deployment, Kubernetes, React Redux, Cloud Services, OpenShift, Git (Version Control System), Cloud Applications, Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Infrastructure As A Service (IaaS), Cloud Applications, Kubernetes, Identity and Access Management, Cloud Computing, Cloud Storage, Network Infrastructure, Containerization, Virtual Machines, Generative AI, Platform As A Service (PaaS), Serverless Computing, Load Balancing, Relational Databases, Scalability
In summary, here are 10 of our most popular vulnerability (computing) courses
- Assets, Threats, and Vulnerabilities:Â Google
- Tools of the Trade: Linux and SQL:Â Google
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Introduction to Cloud Computing:Â IBM
- Play It Safe: Manage Security Risks:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- IBM Full Stack Software Developer:Â IBM
- Application Security for Developers and DevOps Professionals:Â IBM