Vulnerability Scanning

Vulnerability Scanning is a systematic approach to identifying, quantifying, and prioritizing the vulnerabilities in a system. Coursera's Vulnerability Scanning catalogue equips you with the knowledge and proficiency needed to ensure the security of your digital infrastructure. You'll learn how to conduct thorough vulnerability assessments using various tools and techniques, understand how to interpret scanning results, and implement robust security measures to mitigate risks. This skill is a crucial component in the fields of cybersecurity and information technology, networking, and web application security. You'll also learn how to create effective vulnerability management strategies and compliance reports, strengthening your ability to protect critical data and systems.
21credentials
80courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability scanning"

  • Status: Free Trial

    Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy

  • Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

  • Status: Free Trial

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Network Administration, Network Routing, Remote Access Systems, User Accounts, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

  • Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases

  • Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • IBM
  • Pearson
  • Infosec
  • EDUCBA
  • Johns Hopkins University
  • Whizlabs