Vulnerability Assessments

Vulnerability Assessments are a critical component of risk management, identifying, quantifying and prioritizing vulnerabilities in a system. Coursera's Vulnerability Assessment catalogue teaches you about the methodologies and tools used to perform these assessments across various system platforms. You'll learn the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its environment. The skills you'll acquire will help strengthen security, protect data, and maintain system integrity in roles such as IT security analyst, system administrator, or cybersecurity consultant.
54credentials
1online degree
228courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability assessments"

  • Status: Preview

    Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface

  • Status: New

    Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity

  • Status: New

    Skills you'll gain: Cyber Security Assessment, Cybersecurity, Vulnerability Assessments, Persona Development, Coordination, Safety and Security

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Network Security, Internet Of Things, Identity and Access Management, Encryption, Security Engineering, Infrastructure Security, Cybersecurity, Security Controls, Threat Management, Cloud Security, Vulnerability Assessments, Threat Detection, Cloud Solutions, Systems Architecture, Cryptography, Information Privacy, Authentications, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity

  • Status: Free Trial

    Skills you'll gain: Blockchain, Secure Coding, Application Security, Security Engineering, Software Design Patterns, Web Applications, Application Programming Interface (API), Vulnerability Assessments, Debugging, Transaction Processing, System Programming, Scalability

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cloud Security, Cloud Computing Architecture, Cloud Management, Cloud Computing, Identity and Access Management, Cloud Infrastructure, Security Controls, CI/CD, Computer Security Incident Management, Scalability, Data Security, Network Troubleshooting, Disaster Recovery, Infrastructure as Code (IaC), Vulnerability Assessments, Key Management, Network Security, Incident Response, Test Planning, Solution Design

  • Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms

  • Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Cloud Management, Multi-Cloud, Threat Detection, Risk Management Framework, Enterprise Security

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Infosec
  • LearnQuest
  • IBM
  • University of Colorado System
  • EDUCBA