• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Vulnerability Scanning
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "vulnerability scanning"

    • U

      University of Colorado Boulder

      Security & Ethical Hacking: Attacking the Network

      Skills you'll gain: Penetration Testing, Network Security, Cyber Security Assessment, Network Monitoring, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Network Protocols, Vulnerability Assessments, TCP/IP, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis

      Build toward a degree

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Nessus Scanner - Network Scanning from Beginner to Advanced

      Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Web Applications, Authentications, Microsoft Windows, Integration Testing, Linux

      Beginner · Course · 1 - 3 Months

    • Status: New
      New
      P

      Packt

      End User Security Awareness

      Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado Boulder

      Planning with Climate Change in Mind

      Skills you'll gain: Environmental Issue, Corporate Sustainability, Environment, Risk Management, Water Resources, Natural Resource Management, Environmental Policy, Community Development, Risk Analysis, Environmental Science, Energy and Utilities, Vulnerability, Estimation

      4.9
      Rating, 4.9 out of 5 stars
      ·
      69 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      L

      LearnQuest

      Identifying and Managing Security Gaps for Remote Teams

      Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies

      5
      Rating, 5 out of 5 stars
      ·
      6 reviews

      Beginner · Specialization · 1 - 3 Months

    • P

      Packt

      Certified Information Security Manager (CISM)

      Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery

      4.4
      Rating, 4.4 out of 5 stars
      ·
      18 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Managing Network Security

      Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection

      4.8
      Rating, 4.8 out of 5 stars
      ·
      233 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Preview
      Preview
      E

      EIT Digital

      Security and Privacy for Big Data - Part 2

      Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography

      4.7
      Rating, 4.7 out of 5 stars
      ·
      261 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Cybersecurity Testing and Prevention

      Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      L

      LearnKartS

      CEH (v12) Practice Projects and Exam Simulators

      Skills you'll gain: Cybersecurity, Penetration Testing, Cyber Security Assessment, Cyber Attacks, Incident Response, Network Security, Solution Design, Threat Modeling, Vulnerability Assessments, Encryption, Problem Solving

      4.7
      Rating, 4.7 out of 5 stars
      ·
      55 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      I

      IBM

      Ethical Hacking with Kali Linux

      Skills you'll gain: Bash (Scripting Language), Network Monitoring, System Configuration, Automation, Virtual Machines

      4.9
      Rating, 4.9 out of 5 stars
      ·
      24 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Preview
      Preview
      I

      Illinois Tech

      Cyber Security Technologies

      Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

      Build toward a degree

      5
      Rating, 5 out of 5 stars
      ·
      8 reviews

      Intermediate · Course · 1 - 3 Months

    Searches related to vulnerability scanning

    vulnerability scanning with nmap: network scanning
    1…171819…35

    In summary, here are 10 of our most popular vulnerability scanning courses

    • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
    • Nessus Scanner - Network Scanning from Beginner to Advanced: Packt
    • End User Security Awareness: Packt
    • Planning with Climate Change in Mind: University of Colorado Boulder
    • Identifying and Managing Security Gaps for Remote Teams: LearnQuest
    • Certified Information Security Manager (CISM): Packt
    • Managing Network Security: Kennesaw State University
    • Security and Privacy for Big Data - Part 2: EIT Digital
    • Cybersecurity Testing and Prevention: Microsoft
    • CEH (v12) Practice Projects and Exam Simulators: LearnKartS

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok