Vulnerability Assessments

Vulnerability Assessments are a critical component of risk management, identifying, quantifying and prioritizing vulnerabilities in a system. Coursera's Vulnerability Assessment catalogue teaches you about the methodologies and tools used to perform these assessments across various system platforms. You'll learn the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization with the necessary knowledge, awareness and risk background to understand the threats to its environment. The skills you'll acquire will help strengthen security, protect data, and maintain system integrity in roles such as IT security analyst, system administrator, or cybersecurity consultant.
54credentials
1online degree
227courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability assessments"

  • Status: Free Trial

    Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Cryptography, Application Security, Security Engineering, Secure Coding, Data Security, Threat Modeling, Security Testing, Solution Design, Vulnerability Assessments, Code Review

  • Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Detection, Internet Of Things, Network Security, Information Systems Security, Infrastructure Security, Security Controls, Data Security, Vulnerability Assessments, Risk Management Framework, Cryptography, Encryption, Cloud Computing

  • Status: Preview

    Skills you'll gain: Application Security, Secure Coding, Threat Modeling, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design

  • Status: Preview

    Skills you'll gain: Threat Modeling, Cyber Risk, Open Web Application Security Project (OWASP), Cybersecurity, Cyber Attacks, Application Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL

  • Status: Free Trial

    Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity

  • Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Server Side, Encryption

  • Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, Cyber Threat Intelligence, Incident Response, Generative AI Agents, Vulnerability Assessments, Computer Security Incident Management, Cloud Security, Threat Detection, IT Automation, Microsoft Azure, OpenAI, Artificial Intelligence

  • Status: New
    Status: Preview

    Skills you'll gain: Continuous Integration, Code Coverage, Vulnerability, Code Review, CI/CD, Application Security, DevSecOps, Vulnerability Assessments, Software Quality Assurance, Maintainability, Software Quality (SQA/SQC), GitHub, Software Installation, System Configuration, Security Management, Data Integration, Quality Improvement, Analysis

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

  • Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a ₩33,319,646 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a ₩33,319,646 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Infosec
  • LearnQuest
  • IBM
  • University of Colorado System
  • EDUCBA