Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability assessment"
- Status: Free
Coursera Instructor Network
Skills you'll gain: Data Ethics, Generative AI, Artificial Intelligence, Ethical Standards And Conduct, AI Personalization, Business Ethics, ChatGPT, End User Training and Support, User Feedback, Education and Training, Information Privacy, Intellectual Property
Codio
Skills you'll gain: Apache Maven, JSON, JUnit, Java Programming, Java, Restful API, Integrated Development Environments, Programming Principles, Package and Software Management, Data Structures, Object Oriented Programming (OOP), Network Protocols, Unit Testing, Style Guides
- Status: Free
Coursera Project Network
Skills you'll gain: Education Software and Technology, Differentiated Instruction, Learning Management Systems, Student Engagement, Literacy, Curriculum Planning, Blended Learning, Student Support and Services, Content Management
Skills you'll gain: Microsoft Teams, Slack (Software), Google Workspace, Collaborative Software, Productivity Software, Microsoft 365, Virtual Teams, Telecommuting, Meeting Facilitation, Communication
- Status: New
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Intrusion Detection and Prevention, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Network Routing, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, Cloud Security, Infrastructure As A Service (IaaS), Amazon DynamoDB, Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Identity and Access Management, Virtual Private Networks (VPN)
- Status: New
Skills you'll gain: Disaster Recovery, Microsoft Azure, Microsoft Copilot, Cloud Security, Continuous Monitoring, Systems Administration, Cloud Storage, Patch Management, Virtual Machines, Identity and Access Management, Data Security
University of Western Australia
Skills you'll gain: Recruitment, Recruitment Strategies, Talent Sourcing, Diversity and Inclusion, Talent Acquisition, Diversity Awareness, Professional Networking, LinkedIn, Cultural Sensitivity, Employee Engagement
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Secure Coding, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Organizational Leadership, Business Continuity, Communication Strategies, Risk Analysis, Complex Problem Solving, Decision Making, Organizational Strategy, Systems Analysis
Infosec
Skills you'll gain: Application Security, Secure Coding, Security Testing, Package and Software Management, Node.JS, Vulnerability Management, Javascript, Dependency Analysis, Vulnerability Assessments, GitHub
In summary, here are 10 of our most popular vulnerability assessment courses
- User Awareness and Education for Generative AI :Â Coursera Instructor Network
- Core Java:Â Codio
- Setting Up a Digital Library with EPIC:Â Coursera Project Network
- Get Started with Messaging & Collaboration Apps: Teams/Zoom:Â SkillUp EdTech
- Information Assurance Analysis:Â Johns Hopkins University
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Azure Backup, Security, and Compliance Administration:Â Microsoft
- Attracting and Sourcing Diverse Candidates:Â University of Western Australia
- OWASP Top 10 - Welcome and Risks 1-5:Â Infosec