• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability"

    • Status: Free Trial
      Free Trial
      E

      EC-Council

      Cybersecurity Attack and Defense Fundamentals

      Skills you'll gain: Mobile Security, Network Security, Penetration Testing, Cloud Security, Security Controls, Cybersecurity, Public Key Infrastructure, Cryptography, Cyber Attacks, Vulnerability Assessments, Cyber Operations, Authorization (Computing), Data Security, Wireless Networks, Malware Protection, Authentications, Security Awareness, Identity and Access Management, Computer Security Awareness Training, Threat Detection

      4.6
      Rating, 4.6 out of 5 stars
      ·
      734 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      The GRC Approach to Managing Cybersecurity

      Skills you'll gain: Cyber Governance, Cyber Security Policies, Security Management, Governance Risk Management and Compliance, Cyber Security Strategy, Cyber Risk, Cybersecurity, Risk Management, Compliance Management, Regulation and Legal Compliance, Risk Analysis, Information Privacy, Performance Measurement, Contingency Planning

      4.7
      Rating, 4.7 out of 5 stars
      ·
      355 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Preview
      Preview
      E

      EIT Digital

      Cybersecurity Awareness and Innovation

      Skills you'll gain: Computer Security Awareness Training, Cyber Attacks, Cybersecurity, Mobile Security, Security Awareness, Threat Management, Information Systems Security, Data Security, Personally Identifiable Information, Cloud Security, Identity and Access Management, Entrepreneurship

      4.6
      Rating, 4.6 out of 5 stars
      ·
      759 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Hacking and Patching

      Skills you'll gain: Code Review, Penetration Testing, Vulnerability Assessments, Secure Coding, Application Security, Security Testing, Software Design Patterns, SQL, Amazon Web Services, Operating Systems, Amazon Elastic Compute Cloud

      4
      Rating, 4 out of 5 stars
      ·
      275 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Identifying Security Vulnerabilities

      Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Application Security, Encryption, Authentications, Data Security, Vulnerability Assessments, Web Applications, Data Validation

      4.7
      Rating, 4.7 out of 5 stars
      ·
      176 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      A

      Akamai Technologies, Inc.

      Akamai Customer Consulting and Support

      Skills you'll gain: Security Management, Network Troubleshooting, General Networking, File Management, Cascading Style Sheets (CSS), Computer Security Incident Management, Network Administration, Authentications, Query Languages, Operating Systems, Web Design and Development, User Accounts, Scripting Languages, Database Design, Animations, Data Manipulation, Data Structures, Python Programming, Software Development, Data Analysis

      4.7
      Rating, 4.7 out of 5 stars
      ·
      280 reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      IBM

      Cybersecurity Case Studies and Capstone Project

      Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Cyber Risk, Personally Identifiable Information, Security Awareness, Network Security, Malware Protection, Payment Card Industry (PCI) Data Security Standards, Artificial Intelligence

      4.8
      Rating, 4.8 out of 5 stars
      ·
      1.5K reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Cybersecurity for Business

      Skills you'll gain: Incident Response, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Cyber Threat Intelligence, Business Risk Management, Penetration Testing, Cloud Security, Security Testing, Authentications, Computer Security Incident Management, Risk Management, Threat Management, Threat Detection, Cyber Security Strategy, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Vulnerability Scanning, Computer Security Awareness Training, Vulnerability Assessments

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.8K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Secure Software Design

      Skills you'll gain: Database Design, Software Design Patterns, Application Security, Software Design, Unit Testing, Vulnerability Assessments, Unified Modeling Language, Threat Modeling, Relational Databases, Vulnerability Management, Software Development Life Cycle, Databases, Systems Development Life Cycle, Technical Design, Software Architecture, Software Visualization, Software Testing, Design Software, Functional Design, Security Software

      4.6
      Rating, 4.6 out of 5 stars
      ·
      436 reviews

      Beginner · Specialization · 3 - 6 Months

    • I

      ISC2

      ISC2 Systems Security Certified Practitioner (SSCP)

      Skills you'll gain: Endpoint Security, Incident Response, Public Key Infrastructure, Security Controls, Cryptography, Continuous Monitoring, Risk Management Framework, Malware Protection, Network Security, Key Management, Computer Security Incident Management, Risk Management, Vulnerability Assessments, Data Security, Authentications, Authorization (Computing), OSI Models, Encryption, Disaster Recovery, Security Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      240 reviews

      Beginner · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      E

      EC-Council

      Ethical Hacking Essentials (EHE)

      Skills you'll gain: Mobile Security, Penetration Testing, Cloud Security, Cybersecurity, Network Security, Cyber Attacks, Vulnerability Assessments, Wireless Networks, Threat Detection, Security Awareness, Application Security, Web Applications, Internet Of Things, Encryption, Authentications

      4.6
      Rating, 4.6 out of 5 stars
      ·
      563 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Mitigating Security Vulnerabilities on Google Cloud

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Threat Management, Application Security, Personally Identifiable Information, Data Loss Prevention, Malware Protection, Infrastructure Security, Data Security, Security Controls, IT Automation, Continuous Monitoring, Security Information and Event Management (SIEM), Identity and Access Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      724 reviews

      Intermediate · Course · 1 - 4 Weeks

    Searches related to vulnerability

    vulnerability types and concepts
    vulnerability scanning with nmap: network scanning
    cloud security, resiliency, and vulnerability management
    1…91011…35

    In summary, here are 10 of our most popular vulnerability courses

    • Cybersecurity Attack and Defense Fundamentals: EC-Council
    • The GRC Approach to Managing Cybersecurity: Kennesaw State University
    • Cybersecurity Awareness and Innovation: EIT Digital
    • Hacking and Patching: University of Colorado System
    • Identifying Security Vulnerabilities: University of California, Davis
    • Akamai Customer Consulting and Support: Akamai Technologies, Inc.
    • Cybersecurity Case Studies and Capstone Project: IBM
    • Cybersecurity for Business: University of Colorado System
    • Secure Software Design: University of Colorado System
    • ISC2 Systems Security Certified Practitioner (SSCP): ISC2

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok