• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerability

More to explore:

Results for "vulnerability "


  • G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003

    Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications

    4.5
    Rating, 4.5 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 1 - 3 Months

  • C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework

    Intermediate · Course · 1 - 4 Weeks

  • L

    LearnKartS

    Ethical Hacking

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Threat Detection, Cryptographic Protocols, Cybersecurity, Cyber Threat Intelligence, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Cyber Security Strategy, Cyber Attacks, Application Security, Security Awareness, Security Controls, Data Security, Cyber Risk, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    291 reviews

    Beginner · Specialization · 1 - 3 Months

  • C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Network Analysis, Operating Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    81 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • P

    Packt

    Vulnerability Types and Concepts

    Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy

    Intermediate · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • L

    LearnKartS

    CompTIA Security+ Certification Preparation

    Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Threat Detection, Security Strategy, Mobile Security, Business Risk Management, Cyber Security Policies, Cyber Security Assessment, Compliance Management, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    48 reviews

    Beginner · Specialization · 1 - 3 Months

  • I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    249 reviews

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • E

    EC-Council

    Information Security Analyst

    Skills you'll gain: Digital Forensics, Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    45 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 1 - 3 Months

  • I

    Infosec

    Writing Secure Code for Android

    Skills you'll gain: Authentications, Cryptography, Secure Coding, Kotlin, Android (Operating System), OAuth, Encryption, Mobile Security, Android Development, Key Management, Exploit development, Application Security, Android Studio, Data Security, Open Web Application Security Project (OWASP), Authorization (Computing), Mobile Development, Security Engineering, Security Controls, Application Development

    Intermediate · Specialization · 1 - 3 Months

1234…45

In summary, here are 10 of our most popular vulnerability courses

  • Assets, Threats, and Vulnerabilities: Google
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
  • Evaluate, Create, and Analyze App Security: Coursera
  • Ethical Hacking: LearnKartS
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera
  • Vulnerability Types and Concepts: Packt
  • CompTIA Security+ Certification Preparation: LearnKartS
  • Application Security for Developers and DevOps Professionals: IBM
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Information Security Analyst: EC-Council

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok