Vulnerability Assessments

Vulnerability Assessments are a critical component of risk management, identifying, quantifying and prioritizing vulnerabilities in a system. Coursera's Vulnerability Assessment catalogue teaches you about the methodologies and tools used to perform these assessments across various system platforms. You'll learn the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its environment. The skills you'll acquire will help strengthen security, protect data, and maintain system integrity in roles such as IT security analyst, system administrator, or cybersecurity consultant.
54credentials
1online degree
228courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability assessments"

  • Status: Free Trial

    Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure

  • Status: Free

    Skills you'll gain: Exploitation techniques, Penetration Testing, Open Web Application Security Project (OWASP), Proxy Servers, Security Testing, Vulnerability Assessments, Web Servers

  • Status: Free Trial

    Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Cyber Threat Intelligence, Network Security, Risk Management

  • Status: Free Trial

    Skills you'll gain: Google Gemini, Google Cloud Platform, Kubernetes, Generative AI, Big Data, Software Development Life Cycle, Cloud Computing, Cloud Security, Development Testing, Application Deployment, Marketing Analytics, DevOps, Application Lifecycle Management, Application Development, Network Planning And Design, Data Analysis, Software Development Tools, Vulnerability Assessments, Security Controls, Security Engineering

  • Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), IT Management, Risk Mitigation, Cybersecurity, Cyber Security Strategy, Vulnerability Assessments, Compliance Management, Information Technology

  • Status: Free Trial

    Skills you'll gain: Blockchain, User Interface and User Experience (UI/UX) Design, Cryptography, Secure Coding, Application Security, Web Development Tools, React Redux, Encryption, User Experience Design, Key Management, Application Design, Cryptographic Protocols, Application Development, Law, Regulation, and Compliance, Regulation and Legal Compliance, Web Applications, Software Development Tools, Front-End Web Development, Vulnerability Assessments, Data Security

  • Status: Free Trial

    Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation

  • Status: Free Trial

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Computer Architecture

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

  • Status: Free Trial

    Akamai Technologies, Inc.

    Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Infosec
  • LearnQuest
  • IBM
  • University of Colorado System
  • EDUCBA