• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Vulnerabilities

Results for "vulnerabilities"


  • G

    Google

    Connect and Protect: Networks and Network Security

    Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    7.2K reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Critical Infrastructure Security

    Skills you'll gain: Infrastructure Security, Vulnerability Management, Vulnerability Assessments, Incident Response, Cyber Threat Intelligence, Cybersecurity, Cyber Security Assessment, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Security Strategy, Cyber Attacks, Cyber Threat Hunting, Network Security, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Malware Protection, Internet Of Things

    Intermediate · Course · 1 - 3 Months

  • I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud 日本語版

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Vulnerability Management, Security Controls, System Monitoring, Event Monitoring, Security Management, Threat Detection

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Bug Bounty from Scratch

    Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing

    Beginner · Course · 3 - 6 Months

  • E

    Edureka

    Generative AI for Cybersecurity Professionals

    Skills you'll gain: AI Security, Responsible AI, Generative AI, Prompt Engineering, Data Ethics, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, LLM Application, Large Language Modeling, Compliance Training, Governance, Cyber Threat Hunting, Cyber Security Policies, Cyber Attacks, Cyber Risk, Artificial Intelligence and Machine Learning (AI/ML), Security Awareness, Machine Learning, Automation

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    PowerShell for Penetration Testing

    Skills you'll gain: Penetration Testing, Lightweight Directory Access Protocols, Active Directory, Windows PowerShell, Open Web Application Security Project (OWASP), Exploitation techniques, Security Testing, API Testing, Vulnerability Scanning, Cloud Security, Windows Servers, Cyber Security Assessment, Azure Active Directory, IT Automation, Scripting, Application Programming Interface (API), Microsoft Azure, Vulnerability Assessments, MySQL Workbench, Cloud Computing

    Intermediate · Course · 3 - 6 Months

  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Mobile Devices, Security, and Operational Procedures

    Skills you'll gain: Endpoint Security, Computer Security Incident Management, Mobile Security, Security Awareness, Malware Protection, Operating System Administration, Email Security, Android (Operating System), Data Maintenance, Multi-Factor Authentication, System Configuration, Apple iOS, Hardware Troubleshooting, Network Administration, Authentications, Change Control

    Beginner · Course · 1 - 3 Months

  • C

    Coursera

    Cybersecurity in modern organizations

    Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Cyber Security Policies, Secure Coding, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.1K reviews

    Intermediate · Specialization · 1 - 3 Months

  • M

    Microsoft

    Web Application Security

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Microsoft Copilot, Application Security, Data Validation, Web Applications, Security Controls, Vulnerability Assessments, Data Security, Data Integrity, Encryption

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Security-Driven Software Development

    Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)

    Intermediate · Course · 3 - 6 Months

1…456…28

In summary, here are 10 of our most popular vulnerabilities courses

  • Connect and Protect: Networks and Network Security: Google
  • Critical Infrastructure Security: Packt
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Mitigating Security Vulnerabilities on Google Cloud 日本語版: Google Cloud
  • Bug Bounty from Scratch: Packt
  • Generative AI for Cybersecurity Professionals: Edureka
  • PowerShell for Penetration Testing: Packt
  • Secure Coding Practices: University of California, Davis
  • Mobile Devices, Security, and Operational Procedures: Packt
  • Cybersecurity in modern organizations: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok