• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability Scanning
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability scanning"

    • Status: Free Trial
      Free Trial
      C

      Codio

      Software Security for Web Applications

      Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy

      4.9
      Rating, 4.9 out of 5 stars
      ·
      14 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      IBM

      IBM Generative AI for Cybersecurity Professionals

      Skills you'll gain: Prompt Engineering, Prompt Engineering Tools, Multimodal Prompts, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, LLM Application, Intrusion Detection and Prevention, Malware Protection, Large Language Modeling, Anomaly Detection, Vulnerability Management, Artificial Intelligence, Incident Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      8.7K reviews

      Intermediate · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking the Network

      Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

      Build toward a degree

      4.6
      Rating, 4.6 out of 5 stars
      ·
      7 reviews

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Hands-On Web App Pentesting

      Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      I

      IBM

      Exploitation and Penetration Testing with Metasploit

      Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines

      4.1
      Rating, 4.1 out of 5 stars
      ·
      10 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Cybersecurity Tools and Technologies

      Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)

      4.8
      Rating, 4.8 out of 5 stars
      ·
      190 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      P

      Packt

      Vulnerability Types and Concepts

      Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy

      Intermediate · Course · 1 - 4 Weeks

    • P

      Packt

      Nmap for Penetration Testing: From Beginner to Advanced

      Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Mitigating Security Vulnerabilities on Google Cloud

      Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring

      4.7
      Rating, 4.7 out of 5 stars
      ·
      724 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: DevSecOps

      Skills you'll gain: DevSecOps, Secure Coding, DevOps, Hardening, Cloud-Native Computing, Software Architecture, Security Engineering, Azure DevOps, Software Design, Microsoft Azure, Kubernetes, Web Applications, Cloud Platforms, Cybersecurity, Infrastructure as Code (IaC), Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Git (Version Control System)

      Beginner · Course · 1 - 3 Months

    • Status: Preview
      Preview
      I

      Illinois Tech

      Cyber Security Technologies

      Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

      Build toward a degree

      4.9
      Rating, 4.9 out of 5 stars
      ·
      9 reviews

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Web Hacking Expert - Full-Stack Exploitation Mastery

      Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

      Intermediate · Course · 1 - 3 Months

    Searches related to vulnerability scanning

    vulnerability scanning with nmap: network scanning
    1…567…36

    In summary, here are 10 of our most popular vulnerability scanning courses

    • Software Security for Web Applications: Codio
    • IBM Generative AI for Cybersecurity Professionals: IBM
    • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
    • Hands-On Web App Pentesting: Packt
    • Exploitation and Penetration Testing with Metasploit: IBM
    • Cybersecurity Tools and Technologies: Microsoft
    • Vulnerability Types and Concepts: Packt
    • Nmap for Penetration Testing: From Beginner to Advanced: Packt
    • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
    • Cyber Security: DevSecOps: Macquarie University

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok