Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability assessments"
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Site Reliability Engineering, Service Level, DevOps, System Monitoring, Risk Management Framework, Software Documentation, Spreadsheet Software
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Incident Response, Computer Security Incident Management, Penetration Testing, Security Management, Cyber Security Assessment, Cyber Attacks, Cybersecurity, Threat Management, Vulnerability Assessments, Data Security, Malware Protection, Network Security
University of Colorado Boulder
Skills you'll gain: Kinesiology, Physical Therapy, Behavioral Health, Health Assessment, Preventative Care, Blood Pressure, Respiration, Anatomy, Life Sciences, Stress Management, Vital Signs, Injury Prevention, Pharmaceuticals, Risk Analysis
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Microsoft Power Platform, Data Visualization Software, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Dashboard, Data Visualization
In summary, here are 10 of our most popular vulnerability assessments courses
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Assets, Threats, and Vulnerabilities:Â Google
- Application Security for Developers and DevOps Professionals:Â IBM
- Google Cybersecurity:Â Google
- Play It Safe: Manage Security Risks:Â Google
- Microsoft Cybersecurity Analyst:Â Microsoft
- Site Reliability Engineering: Measuring and Managing Reliability:Â Google Cloud
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Cybersecurity Tools and Technologies:Â Microsoft
- Cybersecurity Case Studies and Capstone Project:Â IBM