• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerabilities

Results for "vulnerabilities"


  • Status: AI Skills
    AI Skills
    I

    IBM

    IBM Cybersecurity Analyst

    Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Networking Hardware, Network Security, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    27K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Secure, Optimize and Evaluate AI Integrations

    Skills you'll gain: API Testing, Performance Testing, IT Security Architecture, Cloud-Based Integration, Application Security, Vulnerability Management, System Monitoring

    Intermediate · Course · 1 - 4 Weeks

  • I

    IBM

    IBM Generative AI for Cybersecurity Professionals

    Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Real Time Data, Artificial Intelligence and Machine Learning (AI/ML), AI Workflows, Anomaly Detection, AI Personalization, Vulnerability Management, Artificial Intelligence, Incident Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    11K reviews

    Intermediate · Specialization · 1 - 3 Months

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Information Systems Security, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Malware Protection, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on GC - Português

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    Securing AI Data and Applications

    Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management

    Intermediate · Course · 3 - 6 Months

  • G

    Google

    Play It Safe: Manage Security Risks

    Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    11K reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud 日本語版

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Vulnerability Management, Security Controls, System Monitoring, Event Monitoring, Security Management, Threat Detection

    Intermediate · Course · 1 - 4 Weeks

  • V

    Vanderbilt University

    Generative AI Cybersecurity & Privacy for Leaders

    Skills you'll gain: Prompt Engineering, AI Security, ChatGPT, Prompt Patterns, Generative AI, Crisis Management, LLM Application, Productivity, Incident Response, Responsible AI, OpenAI, AI Personalization, AI Enablement, Data Ethics, Artificial Intelligence, Large Language Modeling, Business Ethics, Information Privacy, Threat Modeling, Cybersecurity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8.4K reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    Pentesting APIs

    Skills you'll gain: Secure Coding, API Testing, Application Programming Interface (API), Security Testing, Open Web Application Security Project (OWASP), Penetration Testing, Application Security, Restful API, Authentications, Personally Identifiable Information, Brute-force attacks, Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Cybersecurity

    Intermediate · Course · 1 - 3 Months

Searches related to vulnerabilities

assets, threats, and vulnerabilities
introduction to prompt injection vulnerabilities
network security & database vulnerabilities
identifying security vulnerabilities
database essentials and vulnerabilities
mitigating security vulnerabilities on google cloud
1234…28

In summary, here are 10 of our most popular vulnerabilities courses

  • IBM Cybersecurity Analyst: IBM
  • Identifying Security Vulnerabilities: University of California, Davis
  • Secure, Optimize and Evaluate AI Integrations: Coursera
  • IBM Generative AI for Cybersecurity Professionals: IBM
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Mitigating Security Vulnerabilities on GC - Português: Google Cloud
  • Securing AI Data and Applications: Coursera
  • Play It Safe: Manage Security Risks: Google
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Mitigating Security Vulnerabilities on Google Cloud 日本語版: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok