• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerabilities

Results for "vulnerabilities"


  • G

    Google Cloud

    Security Command Center: Vulnerabilities/Misconfigurations

    Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    Cybersecurity in modern organizations

    Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Cyber Security Policies, Secure Coding, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.1K reviews

    Intermediate · Specialization · 1 - 3 Months

  • P

    Pragmatic AI Labs

    GitHub: Governing AI-Generated Code

    Skills you'll gain: AI Security, Code Review, Secure Coding, Microsoft Copilot, Anthropic Claude, Security Testing, Prompt Patterns, LLM Application, OpenAI API, Generative AI, Large Language Modeling, Open Web Application Security Project (OWASP), Verification And Validation, AI Workflows, Generative AI Agents, Responsible AI, Vulnerability Scanning, AI Enablement, Prompt Engineering, GitHub

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Critical Infrastructure Security

    Skills you'll gain: Infrastructure Security, Vulnerability Management, Vulnerability Assessments, Incident Response, Cyber Threat Intelligence, Cybersecurity, Cyber Security Assessment, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Security Strategy, Cyber Attacks, Cyber Threat Hunting, Network Security, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Malware Protection, Internet Of Things

    Intermediate · Course · 1 - 3 Months

  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on GC - Português

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management, Cloud Services

    Intermediate · Course · 1 - 3 Months

  • C

    Coursera

    Securing AI Data and Applications

    Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management

    Intermediate · Course · 3 - 6 Months

  • E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    610 reviews

    Beginner · Course · 1 - 3 Months

  • I

    Infosec

    Introduction to Secure Coding and Input Validation in iOS

    Skills you'll gain: Apple iOS, Open Web Application Security Project (OWASP), Swift Programming, Mobile Security, Mobile Development, Secure Coding, IT Security Architecture, Application Security, Data Validation, Vulnerability Assessments, Cryptography, Application Programming Interface (API), JSON

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Information Systems Security, Google Cloud Platform, Data Security, Application Security, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    Infosec

    Intro to Secure Coding and Input Validation in Android

    Skills you'll gain: Secure Coding, Kotlin, Mobile Security, Android (Operating System), Android Development, Open Web Application Security Project (OWASP), Mobile Development, Application Security, Mobile Development Tools, Data Validation, Data Cleansing, Data Security, Application Deployment

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    PowerShell for Penetration Testing

    Skills you'll gain: Penetration Testing, Lightweight Directory Access Protocols, Active Directory, Windows PowerShell, Open Web Application Security Project (OWASP), Exploitation techniques, Security Testing, API Testing, Vulnerability Scanning, Cloud Security, Windows Servers, Cyber Security Assessment, Azure Active Directory, IT Automation, Scripting, Application Programming Interface (API), Microsoft Azure, Vulnerability Assessments, MySQL Workbench, Cloud Computing

    Intermediate · Course · 3 - 6 Months

1234…28

In summary, here are 10 of our most popular vulnerabilities courses

  • Security Command Center: Vulnerabilities/Misconfigurations: Google Cloud
  • Cybersecurity in modern organizations: Coursera
  • GitHub: Governing AI-Generated Code: Pragmatic AI Labs
  • Critical Infrastructure Security: Packt
  • Identifying Security Vulnerabilities: University of California, Davis
  • Mitigating Security Vulnerabilities on GC - Português: Google Cloud
  • Securing AI Data and Applications: Coursera
  • Ethical Hacking Essentials (EHE): EC-Council
  • Introduction to Secure Coding and Input Validation in iOS: Infosec
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok