• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability"

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Secure Coding Practices

      Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Application Security, Data Security, Security Controls, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Cybersecurity

      4.5
      Rating, 4.5 out of 5 stars
      ·
      596 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Cybersecurity and the X-Factor

      Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance

      4.7
      Rating, 4.7 out of 5 stars
      ·
      259 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      L

      LearnKartS

      System and Network Security

      Skills you'll gain: Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Penetration Testing, Cyber Attacks, Information Systems Security, Firewall, Threat Detection, Vulnerability Scanning, Security Controls, Internet Of Things, Network Analysis, Wireless Networks

      4.9
      Rating, 4.9 out of 5 stars
      ·
      42 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      E

      EC-Council

      Ethical Hacking Essentials (EHE)

      Skills you'll gain: Penetration Testing, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Application Security, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

      4.6
      Rating, 4.6 out of 5 stars
      ·
      565 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of London

      Cyber Security – Technology and Governance

      Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Network Protocols, Cybersecurity, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

      4.8
      Rating, 4.8 out of 5 stars
      ·
      103 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Fundamentals of Computer Network Security

      Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns

      4
      Rating, 4 out of 5 stars
      ·
      581 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Secure Software Design

      Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Security Software, Software Engineering, Software Development Life Cycle, Systems Design

      4.6
      Rating, 4.6 out of 5 stars
      ·
      436 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      L

      LearnKartS

      Certified Ethical Hacking (v12)

      Skills you'll gain: Penetration Testing, Network Security, Firewall, Cloud Services, Cloud Infrastructure, Incident Response, Vulnerability Scanning, Security Controls, Virtualization, Encryption, Solution Design, Threat Modeling, Application Security, Internet Of Things, Cryptography, Web Applications, Web Servers, Network Analysis, Wireless Networks, SQL

      4.7
      Rating, 4.7 out of 5 stars
      ·
      253 reviews

      Intermediate · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Akamai Technologies, Inc.

      Akamai Customer Consulting and Support

      Skills you'll gain: Endpoint Security, Database Systems, Computer Security Incident Management, Security Management, Routing Protocols, Database Design, Application Development, Network Architecture, Linux Commands, TCP/IP, Operating Systems, Database Theory, User Accounts, Web Design and Development, Cascading Style Sheets (CSS), Web Development, Data Structures, Python Programming, Data Analysis, Software Development

      4.7
      Rating, 4.7 out of 5 stars
      ·
      287 reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      I

      Illinois Tech

      Security: A Comprehensive Approach

      Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, System Monitoring, Risk Management

      Build toward a degree

      4.7
      Rating, 4.7 out of 5 stars
      ·
      28 reviews

      Intermediate · Specialization · 3 - 6 Months

    • I

      ISC2

      ISC2 Systems Security Certified Practitioner (SSCP)

      Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Public Key Infrastructure, Continuous Monitoring, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)

      4.7
      Rating, 4.7 out of 5 stars
      ·
      246 reviews

      Beginner · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Akamai Technologies, Inc.

      Akamai Network Engineering

      Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Computer Security Incident Management, Security Management, Linux Administration, File Systems, Routing Protocols, OSI Models, Database Design, Application Development, Remote Access Systems, Scripting, MySQL

      4.7
      Rating, 4.7 out of 5 stars
      ·
      268 reviews

      Beginner · Professional Certificate · 3 - 6 Months

    Searches related to vulnerability

    vulnerability scanning with nmap: network scanning
    vulnerability types and concepts
    cloud security, resiliency, and vulnerability management
    1…101112…36

    In summary, here are 10 of our most popular vulnerability courses

    • Secure Coding Practices: University of California, Davis
    • Cybersecurity and the X-Factor: Kennesaw State University
    • System and Network Security: LearnKartS
    • Ethical Hacking Essentials (EHE): EC-Council
    • Cyber Security – Technology and Governance: University of London
    • Fundamentals of Computer Network Security: University of Colorado System
    • Secure Software Design: University of Colorado System
    • Certified Ethical Hacking (v12): LearnKartS
    • Akamai Customer Consulting and Support: Akamai Technologies, Inc.
    • Security: A Comprehensive Approach: Illinois Tech

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok