Vulnerability Management

Vulnerability Management is a strategic process that is key for maintaining system security by identifying, classifying, remediating, and mitigating vulnerabilities. Coursera's vulnerability management catalogue will equip you with the skills to proactively prevent the exploitation of IT security gaps and weaknesses that exist particularly in a system or network. You'll learn the comprehensive steps involved in managing system vulnerabilities, including threat identification, risk assessment, problem remediation, and evaluation of the management process. You will also gain familiarity with key vulnerability management tools and technologies, and learn how to effectively implement vulnerability management strategies in various organizational contexts. This knowledge will enhance your ability to protect valuable data and maintain a secure IT environment.
27credentials
81courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "vulnerability management"

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

  • Status: Free Trial

    Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Cloud Computing, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Infrastructure Security, Threat Detection, Security Controls, Disaster Recovery, Authentications

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL

  • Status: Free Trial

    Kennesaw State University

    Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Cyber Security Policies, Security Management, Firewall, Computer Security Incident Management, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management

  • Status: Free Trial

    University of California, Davis

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Server Side

What brings you to Coursera today?

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Cybersecurity, Computer Security Incident Management, Cyber Threat Intelligence, Security Controls, Threat Management, Business Risk Management, Cyber Attacks, Cyber Operations, Threat Detection, Cloud Security, Risk Management, Cyber Governance, Security Strategy, Security Awareness, Vulnerability, Governance Risk Management and Compliance, Vulnerability Scanning, Vulnerability Assessments

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

  • Status: New
    Status: Free Trial

    Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations

  • Status: Free Trial

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

  • Status: Free Trial

    Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery

Related roles

Gain the knowledge and skills you need to advance.

  • This role has a £50,440 median salary ¹.

    description:

    A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.

    This role has a £50,440 median salary ¹.

    Offered by

    Google_logo
    Microsoft_logo
    IBM_logo
  • This role has a £51,597 median salary ¹.

    description:

    A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.

    This role has a £51,597 median salary ¹.

    Offered by

    IBM_logo
    ISC2_logo

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Google
  • IBM
  • Infosec
  • LearnQuest
  • Kennesaw State University