Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "vulnerability"
- Status: Free
University of Minnesota
Skills you'll gain: Child Welfare, Crisis Intervention, Research, Research Methodologies, Working With Children, Trauma Care, Child Development, Emergency Response, Risk Analysis, Social Sciences, Human Development, International Relations, Cultural Diversity, Systems Thinking, Culture
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, World History, Risk Management Framework
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Web Servers, Servers, Web Applications
University of Michigan
Skills you'll gain: Resilience, Educational Materials, Systems Thinking, Diversity Awareness, Adaptability, Instructional Design, Education Software and Technology, Constructive Feedback, Innovation, Collaboration, Goal Setting, Planning
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Asset Management
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free
University of Manchester
Skills you'll gain: Health Equity, Health Disparities, Public Health, Healthcare Ethics, Emergency Response, Health Care, Health Systems, Ethical Standards And Conduct, International Relations, Infectious Diseases, Policy Analysis, Vulnerability
- Status: Free
University of Geneva
Skills you'll gain: Research Methodologies, Health Policy, Research, Qualitative Research, Community Outreach, Policty Analysis, Research, and Development, Ethical Standards And Conduct, Data Collection, Accountability, Decision Making, Adaptability, Communication
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Patch Management
- Status: Free
University of Copenhagen
Skills you'll gain: Epidemiology, Pollution Prevention, Public Health, Environment Health And Safety, Health Disparities, Environmental Policy, Environmental Science, Environmental Monitoring, Health Assessment, Respiratory Care, Chronic Diseases, Mitigation, Vulnerability
- Status: Free
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Risk Mitigation, Natural Language Processing
In summary, here are 10 of our most popular vulnerability courses
- Resilience in Children Exposed to Trauma, Disaster and War: Global Perspectives:Â University of Minnesota
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists:Â University of Colorado System
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- Resilient Teaching Through Times of Crisis and Change:Â University of Michigan
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Global Health and Humanitarianism:Â University of Manchester
- Operational Research for Humanitarians:Â University of Geneva
- OWASP Top 10 - Risks 6-10:Â Infosec