Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
Codio
Skills you'll gain: Apache Maven, JSON, JUnit, Java Programming, Java, Restful API, Integrated Development Environments, Programming Principles, Package and Software Management, Data Structures, Object Oriented Programming (OOP), Network Protocols, Unit Testing, Style Guides
- Status: Free
Coursera Instructor Network
Skills you'll gain: Data Ethics, Generative AI, Artificial Intelligence, Ethical Standards And Conduct, AI Personalization, Business Ethics, ChatGPT, End User Training and Support, User Feedback, Education and Training, Information Privacy, Intellectual Property
- Status: Free
Coursera Project Network
Skills you'll gain: Education Software and Technology, Differentiated Instruction, Learning Management Systems, Student Engagement, Literacy, Curriculum Planning, Digital Publishing, Classroom Management, Blended Learning, Student Support and Services, Resource Allocation
- Status: New
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Intrusion Detection and Prevention, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Network Routing, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment
- Status: New
Skills you'll gain: Disaster Recovery, Microsoft Azure, Microsoft Copilot, Cloud Security, Continuous Monitoring, Systems Administration, Cloud Storage, Patch Management, Virtual Machines, Identity and Access Management, Data Security
University of Western Australia
Skills you'll gain: Recruitment, Recruitment Strategies, Talent Sourcing, Diversity and Inclusion, Talent Acquisition, Diversity Awareness, Professional Networking, LinkedIn, Cultural Sensitivity, Employee Engagement
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Secure Coding, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Organizational Leadership, Business Continuity, Communication Strategies, Risk Analysis, Complex Problem Solving, Decision Making, Organizational Strategy, Systems Analysis
Skills you'll gain: Object Oriented Programming (OOP), Software Documentation, Java, Computer Programming, Programming Principles, Computational Thinking
University of Illinois Urbana-Champaign
Skills you'll gain: New Product Development, Product Development, Design Thinking, Market Research, Quantitative Research, Product Management, Customer Insights, Consumer Behaviour, Market Analysis, Target Market, Forecasting, Innovation, Needs Assessment, Analysis, Data Collection, Technology Solutions
In summary, here are 10 of our most popular vulnerability assessment courses
- Core Java:Â Codio
- User Awareness and Education for Generative AI :Â Coursera Instructor Network
- Setting Up a Digital Library with EPIC:Â Coursera Project Network
- Information Assurance Analysis:Â Johns Hopkins University
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Azure Backup, Security, and Compliance Administration:Â Microsoft
- Attracting and Sourcing Diverse Candidates:Â University of Western Australia
- OWASP Top 10 - Welcome and Risks 1-5:Â Infosec
- Resilience & Leadership: Tools, Methods, & Applications:Â University of Colorado Boulder