• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability Scanning
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability scanning"

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Packt

      CompTIA Security+ (SY0-701)

      Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management

      4.8
      Rating, 4.8 out of 5 stars
      ·
      6 reviews

      Intermediate · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Arizona State University

      Digital Safety and Security

      Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      54 reviews

      Mixed · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      P

      Packt

      Certified Incident Handler (ECIH) v2

      Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Disaster Recovery, Vulnerability Assessments, Cyber Threat Intelligence, Network Security, Risk Management

      Intermediate · Specialization · 1 - 3 Months

    • P

      Packt

      Risk Management for Cybersecurity and IT Managers

      Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), IT Management, Risk Mitigation, Cybersecurity, Cyber Security Strategy, Vulnerability Assessments, Compliance Management, Information Technology

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Information Assurance Analysis

      Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

      3.9
      Rating, 3.9 out of 5 stars
      ·
      7 reviews

      Intermediate · Specialization · 3 - 6 Months

    • P

      Packt

      Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

      Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines

      Intermediate · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      I

      Infosec

      CISSP Domain 1: Security and Risk Management

      Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property

      4.3
      Rating, 4.3 out of 5 stars
      ·
      15 reviews

      Advanced · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      B

      Banco Interamericano de Desarrollo

      Análisis de riesgos de desastres y cambio climático

      Skills you'll gain: Risk Analysis, Risk Management, Risk Modeling, Hazard Analysis, Mitigation, Project Risk Management, Governance, Failure Analysis, Risk Mitigation, Feasibility Studies, Failure Mode And Effects Analysis, Disaster Recovery, Performance Metric, Climate Change Adaptation, Business Priorities, Vulnerability Assessments, Civil Engineering, Investment Management, Project Management, Decision Making

      4.6
      Rating, 4.6 out of 5 stars
      ·
      33 reviews

      Advanced · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      I

      ISC2

      Risk Management and Risk Assessment in a Healthcare Setting

      Skills you'll gain: Continuous Monitoring, Medical Privacy, Risk Management, Health Information Management, Health Care Procedure and Regulation, Risk Mitigation, Information Privacy, Security Management, Risk Analysis, Patient Safety, Personally Identifiable Information, Information Systems Security, Security Controls, Data Security, Regulatory Compliance, Threat Modeling, Vulnerability Assessments

      4.5
      Rating, 4.5 out of 5 stars
      ·
      6 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      P

      Packt

      Ethical Hacking Foundations

      Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Security, Cybersecurity, Data Ethics, Vulnerability Assessments, Wireless Networks, System Configuration, Software Installation, Virtual Machines

      4.2
      Rating, 4.2 out of 5 stars
      ·
      31 reviews

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      M

      Macquarie University

      Cyber Security: Data Security and Information Privacy

      Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Packt

      Security Architecture & Operations

      Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)

      Intermediate · Course · 1 - 4 Weeks

    Searches related to vulnerability scanning

    vulnerability scanning with nmap: network scanning
    1…252627…36

    In summary, here are 10 of our most popular vulnerability scanning courses

    • CompTIA Security+ (SY0-701): Packt
    • Digital Safety and Security: Arizona State University
    • Certified Incident Handler (ECIH) v2: Packt
    • Risk Management for Cybersecurity and IT Managers: Packt
    • Information Assurance Analysis: Johns Hopkins University
    • Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
    • CISSP Domain 1: Security and Risk Management: Infosec
    • Análisis de riesgos de desastres y cambio climático: Banco Interamericano de Desarrollo
    • Risk Management and Risk Assessment in a Healthcare Setting: ISC2
    • Ethical Hacking Foundations: Packt

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok