Vulnerability Assessments

Vulnerability Assessments are a critical component of risk management, identifying, quantifying and prioritizing vulnerabilities in a system. Coursera's Vulnerability Assessment catalogue teaches you about the methodologies and tools used to perform these assessments across various system platforms. You'll learn the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its environment. The skills you'll acquire will help strengthen security, protect data, and maintain system integrity in roles such as IT security analyst, system administrator, or cybersecurity consultant.
54credentials
1online degree
230courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability assessments"

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security

  • Status: New

    Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Vulnerability Management, Cyber Risk, Security Management, Cyber Security Assessment, Simulations, Configuration Management, Cloud Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

  • Status: New

    Skills you'll gain: Open Web Application Security Project (OWASP), Large Language Modeling, Vulnerability Assessments, Vulnerability Management, Application Security, Secure Coding, Security Controls, Safety and Security, Google Cloud Platform, Security Requirements Analysis, Cloud API, API Design, Application Development, System Configuration, Program Development

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Detection, Threat Management, Vulnerability Management, Cloud Security, Vulnerability Assessments, Security Strategy, Multi-Cloud, Google Cloud Platform, Enterprise Security, Security Information and Event Management (SIEM), Security Controls, Risk Management Framework

  • Status: New

    Skills you'll gain: Large Language Modeling, Open Web Application Security Project (OWASP), Prompt Engineering, Application Security, Security Controls, Continuous Monitoring, Vulnerability Assessments, Google Cloud Platform, Software Architecture, Application Programming Interface (API), Safety and Security

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy

  • Status: New

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Continuous Integration, Secure Coding, Continuous Delivery, Regulatory Compliance, Security Engineering, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Compliance Auditing

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

  • Status: New
    Status: Preview

    Coursera Instructor Network

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, Cybersecurity, Debugging, SQL

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a £50,440 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a £50,440 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Infosec
  • LearnQuest
  • IBM
  • University of Colorado System
  • EDUCBA