Vulnerability Management

Vulnerability Management is a strategic process that is key for maintaining system security by identifying, classifying, remediating, and mitigating vulnerabilities. Coursera's vulnerability management catalogue will equip you with the skills to proactively prevent the exploitation of IT security gaps and weaknesses that exist particularly in a system or network. You'll learn the comprehensive steps involved in managing system vulnerabilities, including threat identification, risk assessment, problem remediation, and evaluation of the management process. You will also gain familiarity with key vulnerability management tools and technologies, and learn how to effectively implement vulnerability management strategies in various organizational contexts. This knowledge will enhance your ability to protect valuable data and maintain a secure IT environment.
27credentials
83courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability management"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy

  • Status: Free Trial

    Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Cyber Attacks, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Linux, Debugging, Cybersecurity, SQL

  • Status: Free Trial

    Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture

  • Status: Free Trial

    Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)

  • Status: Free Trial

    University of California, Davis

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)

  • Status: New
    Status: Preview

    Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management

  • Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Application Security, Cloud Security, Vulnerability Management, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: Computer Security Incident Management, NIST 800-53, Security Controls, Disaster Recovery, Authorization (Computing), Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Change Control, Cybersecurity, Risk Management, System Monitoring, Security Strategy, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Vulnerability Management, Configuration Management, Enterprise Security

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo
  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Google
  • IBM
  • Infosec
  • LearnQuest
  • Kennesaw State University