Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability+scanner"
- Status: [object Object]
Google
Skills you'll gain: Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Network Security, Security Controls, Threat Detection, Risk Management, Cybersecurity, Hardening, Incident Management, Bash (Scripting Language), Data Ethics, TCP/IP, Security Information and Event Management (SIEM), Linux Commands, Command-Line Interface, Security Awareness, Debugging
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Security Management, Cyber Security Policies, Cyber Risk, Cyber Security Strategy, Information Assurance, Compliance Auditing
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Data Ethics, Incident Response, Security Awareness, Computer Security Incident Management, Incident Management, Cybersecurity, Security Management, Computer Security Awareness Training, Cyber Security Policies, Artificial Intelligence, Technical Communication
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
In summary, here are 10 of our most popular vulnerability+scanner courses
- Google Cybersecurity: Google
- Application Security for Developers and DevOps Professionals: IBM
- Play It Safe: Manage Security Risks: Google
- Automate Cybersecurity Tasks with Python: Google
- IT Security: Defense against the digital dark arts : Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Assets, Threats, and Vulnerabilities: Google
- Put It to Work: Prepare for Cybersecurity Jobs: Google
- Tools of the Trade: Linux and SQL: Google