Vulnerability Management

Vulnerability Management is a strategic process that is key for maintaining system security by identifying, classifying, remediating, and mitigating vulnerabilities. Coursera's vulnerability management catalogue will equip you with the skills to proactively prevent the exploitation of IT security gaps and weaknesses that exist particularly in a system or network. You'll learn the comprehensive steps involved in managing system vulnerabilities, including threat identification, risk assessment, problem remediation, and evaluation of the management process. You will also gain familiarity with key vulnerability management tools and technologies, and learn how to effectively implement vulnerability management strategies in various organizational contexts. This knowledge will enhance your ability to protect valuable data and maintain a secure IT environment.
27credentials
83courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability management"

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)

  • Status: Free Trial

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols

  • Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Assessments, Vulnerability Management, Security Management, Security Controls, Google Cloud Platform, Configuration Management

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Cyber Threat Hunting, Event Monitoring, Technical Communication, Cyber Security Policies, Vulnerability Management, Continuous Monitoring, Threat Management, Security Controls, Communication Strategies, Root Cause Analysis

  • Status: New

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Incident Response, Cybersecurity, Google Gemini, Intrusion Detection and Prevention, Continuous Monitoring, Vulnerability Management, Computer Security Incident Management, Infrastructure Security, Risk Management Framework, Cloud Security, AI Product Strategy, Data Integration, Interactive Data Visualization

  • Status: New

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Continuous Integration, Secure Coding, Continuous Delivery, Regulatory Compliance, Security Engineering, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Compliance Auditing

  • Skills you'll gain: Threat Detection, Vulnerability Management, Threat Management, Cloud Security, Vulnerability Assessments, Computer Security Incident Management, Security Management, Multi-Cloud, Security Information and Event Management (SIEM), Risk Management Framework, Incident Management

  • Status: New

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Incident Response, Cybersecurity, Google Gemini, Computer Security Incident Management, Vulnerability Management, Continuous Monitoring, Infrastructure Security, Generative AI Agents

  • Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms

  • Status: New

    Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Endpoint Detection and Response, Threat Modeling, Cybersecurity, Incident Response, Security Information and Event Management (SIEM), Continuous Monitoring, Vulnerability Management, Vulnerability Assessments, Google Gemini, Generative AI

  • Status: New
    Status: Free Trial

    Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Hardening, Security Controls, Docker (Software), Image Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Red Hat Enterprise Linux, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Security Information and Event Management (SIEM), Vulnerability Scanning, Role-Based Access Control (RBAC), Vulnerability Management, Scalability, Version Control

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a $116,480 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a $116,480 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo
  • This role has a $119,168 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a $119,168 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Google
  • IBM
  • Infosec
  • LearnQuest
  • Kennesaw State University