Vulnerability Scanning

Vulnerability Scanning is a systematic approach to identifying, quantifying, and prioritizing the vulnerabilities in a system. Coursera's Vulnerability Scanning catalogue equips you with the knowledge and proficiency needed to ensure the security of your digital infrastructure. You'll learn how to conduct thorough vulnerability assessments using various tools and techniques, understand how to interpret scanning results, and implement robust security measures to mitigate risks. This skill is a crucial component in the fields of cybersecurity and information technology, networking, and web application security. You'll also learn how to create effective vulnerability management strategies and compliance reports, strengthening your ability to protect critical data and systems.
19credentials
78courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability scanning"

  • Status: Free

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning

  • Status: New
    Status: Preview

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology

What brings you to Coursera today?

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Cybersecurity, Computer Security Incident Management, Cyber Threat Intelligence, Security Controls, Threat Management, Business Risk Management, Cyber Attacks, Cyber Operations, Threat Detection, Cloud Security, Risk Management, Cyber Governance, Security Strategy, Security Awareness, Vulnerability, Governance Risk Management and Compliance, Vulnerability Scanning, Vulnerability Assessments

  • Status: New
    Status: Free Trial

    Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • IBM
  • Infosec
  • Pearson
  • Johns Hopkins University
  • LearnKartS
  • Whizlabs