Vulnerability Scanning

Vulnerability Scanning is a systematic approach to identifying, quantifying, and prioritizing the vulnerabilities in a system. Coursera's Vulnerability Scanning catalogue equips you with the knowledge and proficiency needed to ensure the security of your digital infrastructure. You'll learn how to conduct thorough vulnerability assessments using various tools and techniques, understand how to interpret scanning results, and implement robust security measures to mitigate risks. This skill is a crucial component in the fields of cybersecurity and information technology, networking, and web application security. You'll also learn how to create effective vulnerability management strategies and compliance reports, strengthening your ability to protect critical data and systems.
21credentials
80courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability scanning"

  • Status: Preview

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)

  • Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation

  • Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers

  • Status: New
    Status: Free Trial

    Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Red Hat Enterprise Linux, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Security Information and Event Management (SIEM), Vulnerability Scanning, Role-Based Access Control (RBAC), Vulnerability Management, Scalability, Version Control

  • Status: New
    Status: Free Trial

    Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation

  • Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation

  • Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms

  • Status: Free Trial

    Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Security Controls, Performance Tuning, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Role-Based Access Control (RBAC), Personally Identifiable Information, Application Performance Management, Vulnerability Scanning, Azure Active Directory

  • Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting

  • Status: Free Trial

    Skills you'll gain: Cloud Security, Kubernetes, Identity and Access Management, Google Cloud Platform, Key Management, Data Security, Authorization (Computing), Security Controls, Cloud API, Cloud Storage, Application Security, Infrastructure Security, Encryption, Vulnerability Scanning, Authentications, Virtual Machines

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • IBM
  • Pearson
  • Infosec
  • EDUCBA
  • Johns Hopkins University
  • Whizlabs