Vulnerability Scanning

Vulnerability Scanning is a systematic approach to identifying, quantifying, and prioritizing the vulnerabilities in a system. Coursera's Vulnerability Scanning catalogue equips you with the knowledge and proficiency needed to ensure the security of your digital infrastructure. You'll learn how to conduct thorough vulnerability assessments using various tools and techniques, understand how to interpret scanning results, and implement robust security measures to mitigate risks. This skill is a crucial component in the fields of cybersecurity and information technology, networking, and web application security. You'll also learn how to create effective vulnerability management strategies and compliance reports, strengthening your ability to protect critical data and systems.
21credentials
80courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability scanning"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Hardening, Security Controls, Docker (Software), Image Analysis

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Personally Identifiable Information, Threat Detection, Cybersecurity, Cyber Attacks, Vulnerability Scanning, Information Privacy, Data Security, Security Awareness, Human Factors (Security), User Accounts

  • Status: Free Trial

    Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity

  • Status: New
    Status: Preview

    Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, Vulnerability Assessments, DevOps, GitHub, Automation

  • Status: New
    Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems

  • Status: Free Trial

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, General Networking, Scripting Languages, Cyber Security Assessment, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Computer Networking

  • Status: Free Trial

    Akamai Technologies, Inc.

    Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Computer Security Incident Management, Security Management, Ubuntu, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Remote Access Systems, Scripting, MySQL

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

  • Status: New
    Status: Preview

    Coursera Instructor Network

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

  • Status: New
    Status: Free Trial

    Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Red Hat Enterprise Linux, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Security Information and Event Management (SIEM), Vulnerability Scanning, Role-Based Access Control (RBAC), Vulnerability Management, Scalability, Version Control