Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessments"
- Status: NewStatus: Free Trial
Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, System Monitoring, Threat Detection, Threat Modeling, Security Software
- Status: Free TrialStatus: AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Threat Management, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Power BI, Microsoft Excel, Data Analysis, Data Visualization, Data Storage, Data Collection, Data Quality, Business Intelligence, Timelines, Microsoft Power Platform, Advanced Analytics, Database Design, Statistical Reporting, Statistical Visualization, Analytical Skills, Data Integration, Data Storage Technologies, SQL, Data Manipulation, Microsoft SQL Servers
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Business Software, Authentications, Active Directory, Data Management, Computer Security Incident Management
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
What brings you to Coursera today?
- Status: Free Trial
Arizona State University
Skills you'll gain: Oral Comprehension, Language Competency, Pedagogy, English Language, Learning Strategies, Instructional Strategies, Enthusiasm, Motivational Skills, Oral Expression, Learning Styles, Language Learning, Education Software and Technology, Vocabulary, Design Elements And Principles, Learning Theory, Design Strategies, Grammar, Self-Awareness, Stress Management, Goal Setting
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
- Status: Free Trial
Skills you'll gain: Talent Acquisition, Training and Development, Compensation and Benefits, Training Programs, Recruitment, Employee Training, Full Cycle Recruitment, Job Analysis, Employee Performance Management, Compensation Management, Performance Appraisal, Job Evaluation, Developing Training Materials, Compensation Strategy, Performance Management, Human Resource Policies, Employee Relations, Occupational Safety And Health, Business Continuity Planning, Risk Management
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis
- Status: Free Trial
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Content Creation, IBM Cloud, Incident Management
In summary, here are 10 of our most popular vulnerability assessments courses
- CISSP Domain 6: Security Assessment and Testing:Â Infosec
- Google Cybersecurity:Â Google
- Microsoft Power BI Data Analyst:Â Microsoft
- Microsoft Cybersecurity Analyst:Â Microsoft
- Security Analyst Fundamentals:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- TESOL Certificate, Part 1: Teach English Now!:Â Arizona State University
- Information Security Analyst:Â EC-Council
- Application Security for Developers and DevOps Professionals:Â IBM
- HRCI Human Resource Associate:Â HRCI