Vulnerability Management

Vulnerability Management is a strategic process that is key for maintaining system security by identifying, classifying, remediating, and mitigating vulnerabilities. Coursera's vulnerability management catalogue will equip you with the skills to proactively prevent the exploitation of IT security gaps and weaknesses that exist particularly in a system or network. You'll learn the comprehensive steps involved in managing system vulnerabilities, including threat identification, risk assessment, problem remediation, and evaluation of the management process. You will also gain familiarity with key vulnerability management tools and technologies, and learn how to effectively implement vulnerability management strategies in various organizational contexts. This knowledge will enhance your ability to protect valuable data and maintain a secure IT environment.
27credentials
83courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability management"

  • Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Threat Detection, General Networking, Vulnerability Management, Linux, Linux Administration, Virtual Machines, Network Analysis

  • Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Continuous Monitoring, Vulnerability Management, Data Security, System Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Information Privacy

  • Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Incident Response, Information Systems Security, Risk Management Framework, Network Security, Security Information and Event Management (SIEM), Event Monitoring, Network Analysis, Firewall, Vulnerability Management, Data Integrity

  • Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Secure Coding, Package and Software Management, Node.JS, Vulnerability Management, Javascript, Vulnerability Assessments

  • Status: Free

    Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Large Language Modeling, Vulnerability Management, Risk Management Framework

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation

  • Status: Free Trial

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

  • Status: Free Trial

    Skills you'll gain: Network Security, Disaster Recovery, Network Administration, Authentications, Vulnerability Assessments, Computer Networking, Network Infrastructure, Wireless Networks, Cybersecurity, Network Monitoring, Local Area Networks, Vulnerability Management, Telecommunications, Network Protocols, Network Switches, Network Routing, Communication Systems, Cryptography, Encryption

  • Status: Free Trial

    Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo
  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Google
  • IBM
  • Infosec
  • LearnQuest
  • Kennesaw State University