Vulnerability Assessments

Vulnerability Assessments are a critical component of risk management, identifying, quantifying and prioritizing vulnerabilities in a system. Coursera's Vulnerability Assessment catalogue teaches you about the methodologies and tools used to perform these assessments across various system platforms. You'll learn the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its environment. The skills you'll acquire will help strengthen security, protect data, and maintain system integrity in roles such as IT security analyst, system administrator, or cybersecurity consultant.
55credentials
1online degree
225courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability assessments"

  • University of Maryland, College Park

    Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments

  • Status: Free Trial

    Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Private Networks (VPN), Security Controls, Cloud Security, Endpoint Security, Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing

  • Status: Free Trial

    Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things

  • Status: Free Trial

    Skills you'll gain: Blockchain, Secure Coding, Application Security, Security Engineering, Software Design Patterns, Web Applications, Application Programming Interface (API), Vulnerability Assessments, Debugging, Transaction Processing, System Programming, Scalability

  • Status: Preview

    Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Risk Modeling, Hazard Analysis, Mitigation, Project Risk Management, Failure Analysis, Risk Mitigation, Disaster Recovery, Failure Mode And Effects Analysis, Climate Change Adaptation, Vulnerability Assessments, Public Policies, Quantitative Research, Qualitative Research

  • Skills you'll gain: Cybersecurity, TCP/IP, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Firewall, Computer Networking, Wireless Networks, Cloud Computing, Information Technology Infrastructure Library, Vulnerability Assessments

  • Status: Free Trial

    Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Threat Detection, Security Requirements Analysis, Cybersecurity, Security Software, Security Management, Telecommuting, Cyber Risk, Cyber Security Strategy, Continuous Monitoring, Security Controls, Virtual Private Networks (VPN), Multi-Factor Authentication

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cloud Security, Cloud Computing Architecture, Cloud Management, Cloud Computing, Identity and Access Management, Cloud Infrastructure, Security Controls, CI/CD, Computer Security Incident Management, Scalability, Data Security, Network Troubleshooting, Disaster Recovery, Infrastructure as Code (IaC), Vulnerability Assessments, Key Management, Network Security, Incident Response, Test Planning, Solution Design