• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerability Scanner

Results for "vulnerability scanner"


  • C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Threat Management, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework, Program Development

    Intermediate · Course · 1 - 4 Weeks

  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    76 reviews

    Beginner · Specialization · 3 - 6 Months

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • I

    IBM

    Introduction to Cybersecurity Essentials

    Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Email Security, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.2K reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

    4.7
    Rating, 4.7 out of 5 stars
    ·
    249 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • C

    Coursera

    Securing Applications with Checkmarx

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming

    Intermediate · Course · 1 - 4 Weeks

  • Status: Job Skills
    Job Skills
    G

    Google

    Google Cybersecurity

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL

    Build toward a degree

    4.8
    Rating, 4.8 out of 5 stars
    ·
    65K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • M

    Microsoft

    Microsoft Azure Security Tools Specialization

    Skills you'll gain: Penetration Testing, Record Keeping, Security Testing, Data Management, Threat Management, Records Management, Cloud Computing Architecture, Authentications, Data Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    50 reviews

    Beginner · Specialization · 3 - 6 Months

  • U

    University at Buffalo

    Digital Manufacturing & Design Technology

    Skills you'll gain: Model Based Systems Engineering, Peer Review, Programmable Logic Controllers, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Collaborative Software, Control Systems, Continuous Monitoring, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Production Process, Cybersecurity, Manufacturing Operations

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7.1K reviews

    Beginner · Specialization · 3 - 6 Months

  • I

    ISC2

    Foundations of Software Lifecycle Development and Security

    Skills you'll gain: Systems Development Life Cycle, Security Controls, Software Testing, Cybersecurity, Risk Management Framework

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Security Command Center: Vulnerabilities/Misconfigurations

    Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export

    Intermediate · Course · 1 - 3 Months

1234…43

In summary, here are 10 of our most popular vulnerability scanner courses

  • Evaluate, Create, and Analyze App Security: Coursera
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Introduction to Cybersecurity Essentials: IBM
  • Application Security for Developers and DevOps Professionals: IBM
  • Assets, Threats, and Vulnerabilities: Google
  • Securing Applications with Checkmarx: Coursera
  • Google Cybersecurity: Google
  • Microsoft Azure Security Tools Specialization: Microsoft
  • Digital Manufacturing & Design Technology: University at Buffalo

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok