• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerabilite
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnérabilité"

    • Status: Preview
      Preview
      C

      Coursera Project Network

      للمبتدئين Metasploit: أساسيات الاستغلال

      Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      P

      Packt

      Foundations and Reconnaissance Techniques

      Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Exploitation techniques, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Applied Cryptography

      Skills you'll gain: Cryptography, Encryption, Network Security, Public Key Infrastructure, Data Security, Key Management, Blockchain, Cybersecurity, Data Encryption Standard, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Security Management, Hardware Architecture

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Data Security and Information Privacy

      Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Governance, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Security Management, Data Sharing, Data Encryption Standard, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Mitigating Security Vulnerabilities on Google Cloud en Français

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Google Cloud Platform, Threat Management, Cloud Security, Threat Detection, Event Monitoring, System Monitoring, Personally Identifiable Information, Data Security, Security Management, Load Balancing, System Software

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      M

      Macquarie University

      Cyber Security: Incident Response - Theory to Practice

      Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Security Policies, Threat Detection, Disaster Recovery, Cyber Risk, Cybersecurity, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      G

      Google Cloud

      Model Armor: Securing AI Deployments

      Skills you'll gain: LLM Application, Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Secure Coding, Security Controls, Security Software, Security Information and Event Management (SIEM), Application Programming Interface (API), System Configuration

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

      Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework

      4.7
      Rating, 4.7 out of 5 stars
      ·
      382 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      P

      Packt

      System Hacking, Malware Threats, and Network Attacks

      Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols

      4.7
      Rating, 4.7 out of 5 stars
      ·
      7 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Cybersecurity Foundations: Threats Networks, and IoT Protection

      Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Pentesting Fundamentals for Beginners

      Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation

      Intermediate · Course · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Resilience & Leadership: Tools, Methods, & Applications

      Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Resilience, Business Continuity, Communication, Risk Analysis, Systems Engineering, Complex Problem Solving, Decision Making, Organizational Strategy, Vulnerability Assessments, Systems Analysis

      Intermediate · Course · 1 - 3 Months

    Searches related to vulnérabilité

    ressources numériques, menaces et vulnérabilités
    vulnerability types and concepts
    cloud security, resiliency, and vulnerability management
    vulnerability scanning with nmap: network scanning
    1…6789

    In summary, here are 10 of our most popular vulnérabilité courses

    • للمبتدئين Metasploit: أساسيات الاستغلال : Coursera Project Network
    • Foundations and Reconnaissance Techniques: Packt
    • Cyber Security: Applied Cryptography: Macquarie University
    • Cyber Security: Data Security and Information Privacy: Macquarie University
    • Mitigating Security Vulnerabilities on Google Cloud en Français: Google Cloud
    • Cyber Security: Incident Response - Theory to Practice: Macquarie University
    • Model Armor: Securing AI Deployments: Google Cloud
    • Homeland Security & Cybersecurity Connection - It's Not About the Terrorists: University of Colorado System
    • System Hacking, Malware Threats, and Network Attacks: Packt
    • Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok