• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability"

    • Status: Preview
      Preview
      S

      Starweaver

      Introduction to Automotive Cybersecurity & Vehicle Networks

      Skills you'll gain: Cyber Governance, Network Security, Cybersecurity, Security Engineering, Intrusion Detection and Prevention, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cryptography, Security Testing, Security Requirements Analysis, Risk Management Framework

      3.5
      Rating, 3.5 out of 5 stars
      ·
      14 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      U

      University of Illinois Urbana-Champaign

      Empathy and Data in Risk Management

      Skills you'll gain: Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Mitigation, Risk Control, Data Visualization, Data Presentation, Persuasive Communication, Tableau Software, Cybersecurity, Communication, Empathy, Data-Driven Decision-Making, Diversity Equity and Inclusion Initiatives, Heat Maps, Stakeholder Engagement, Artificial Intelligence, Algorithms

      Build toward a degree

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Proactive Computer Security

      Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Penetration Testing, Security Testing, Threat Management, Threat Detection, Application Security, Vulnerability Scanning, Vulnerability Assessments, Security Management, Security Strategy, Data Sharing, Test Tools, Incident Response

      4.7
      Rating, 4.7 out of 5 stars
      ·
      260 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      L

      LearnKartS

      Advanced Cybersecurity

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cybersecurity, Cloud Computing, Mobile Security, Vulnerability Assessments, Penetration Testing, Android (Operating System), Cryptography, Virtualization, Encryption, Virtual Machines, SQL

      4.7
      Rating, 4.7 out of 5 stars
      ·
      42 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      P

      Packt

      Certified Ethical Hacker (CEH) v.12

      Skills you'll gain: Open Web Application Security Project (OWASP), MITRE ATT&CK Framework, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Mobile Security, Cybersecurity, Vulnerability Assessments, Penetration Testing, Cloud Security, Vulnerability Scanning, Threat Detection, Cyber Threat Intelligence, Malware Protection, Vulnerability Management, Information Systems Security, Intrusion Detection and Prevention, Cyber Attacks, Cloud Computing, Network Security, Cryptography

      4.7
      Rating, 4.7 out of 5 stars
      ·
      18 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      P

      Packt

      Ethical Hacking Foundations

      Skills you'll gain: Linux Commands, Linux, Penetration Testing, Command-Line Interface, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Vulnerability Assessments, General Networking, Network Security, Computer Networking, Virtual Machines

      4.2
      Rating, 4.2 out of 5 stars
      ·
      29 reviews

      Beginner · Course · 1 - 3 Months

    • I

      ISC2

      Risk Identification, Monitoring, and Analysis

      Skills you'll gain: Continuous Monitoring, Risk Management Framework, Risk Management, Vulnerability Assessments, Vulnerability Management, Security Management, Cyber Risk, Enterprise Risk Management (ERM), Risk Analysis, Risk Mitigation, Information Systems Security, Compliance Management, Threat Detection, Incident Response, Network Monitoring, Technical Communication, Network Analysis

      4.7
      Rating, 4.7 out of 5 stars
      ·
      23 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      P

      Packt

      System Hacking, Malware Threats, and Network Attacks

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cybersecurity, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Detection, Malware Protection, Vulnerability Management, Information Systems Security, Cyber Attacks, Network Security, Human Factors (Security), Security Controls, Authentications, Network Protocols

      4.7
      Rating, 4.7 out of 5 stars
      ·
      6 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      A General Approach to Risk Management

      Skills you'll gain: Risk Management Framework, Risk Management, Risk Appetite, Security Management, Threat Management, Enterprise Risk Management (ERM), Operational Risk, Business Risk Management, Governance Risk Management and Compliance, Risk Mitigation, Risk Analysis, Continuous Improvement Process, Vulnerability Assessments

      4.9
      Rating, 4.9 out of 5 stars
      ·
      43 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Cyber Incident Response

      Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Disaster Recovery, Intrusion Detection and Prevention, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Attacks, Endpoint Detection and Response, Security Management, Threat Detection, Threat Management, Cyber Security Strategy, Cyber Security Policies, Event Monitoring, Business Continuity, Network Monitoring, Network Analysis, Vulnerability Assessments, Analysis

      4.7
      Rating, 4.7 out of 5 stars
      ·
      257 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Resilience Engineering and Leadership in Crisis

      Skills you'll gain: Crisis Management, Systems Thinking, Resilience, Risk Management, Business Continuity, Business Ethics, Strategic Communication, Emergency Response, Contingency Planning, Threat Management, Organizational Strategy, Disaster Recovery, Systems Engineering, Threat Detection, Human Factors (Security), Organizational Change, Corporate Strategy, Infrastructure Security, Vulnerability Assessments, Leadership

      Build toward a degree

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      What Is Cybersecurity?

      Skills you'll gain: Cybersecurity, Threat Detection, Computer Security Awareness Training, Cyber Attacks, Cyber Security Policies, Network Security, Information Privacy, Personally Identifiable Information, General Data Protection Regulation (GDPR), ISO/IEC 27001, Data Ethics, NIST 800-53, Authentications

      4.9
      Rating, 4.9 out of 5 stars
      ·
      9 reviews

      Beginner · Course · 1 - 3 Months

    Searches related to vulnerability

    vulnerability types and concepts
    vulnerability scanning with nmap: network scanning
    cloud security, resiliency, and vulnerability management
    1…181920…35

    In summary, here are 10 of our most popular vulnerability courses

    • Introduction to Automotive Cybersecurity & Vehicle Networks: Starweaver
    • Empathy and Data in Risk Management: University of Illinois Urbana-Champaign
    • Proactive Computer Security: University of Colorado System
    • Advanced Cybersecurity: LearnKartS
    • Certified Ethical Hacker (CEH) v.12: Packt
    • Ethical Hacking Foundations: Packt
    • Risk Identification, Monitoring, and Analysis: ISC2
    • System Hacking, Malware Threats, and Network Attacks: Packt
    • A General Approach to Risk Management: Kennesaw State University
    • Cyber Incident Response: Infosec

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok