Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn Vulnerability Scanning, earn certificates with paid and free online courses from University System of Maryland, New York University (NYU) and other top universities around the world. Read reviews to decide if a class is right for you.
Hands-on lab exploring vulnerability scanning, penetration testing, and network security techniques to identify and assess system weaknesses.
Learn to scan and secure your app against vulnerabilities using AppSweep, a powerful tool for identifying and addressing security issues in mobile applications.
This course will teach you how to use the OpenVAS suite to perform complete and effective vulnerability scans.
Learn to use Trivy for Docker image analysis, vulnerability scanning, and security risk detection. Gain practical skills in cybersecurity through hands-on demonstrations and expert guidance.
Uncover limitations of vulnerability scanners and SCA tools through groundbreaking research. Learn about hidden vulnerabilities, scanner blindspots, and the need for holistic software security approaches.
Explore vulnerability scanning in cloud-native projects, learn to prioritize vulnerabilities, and implement effective scanners. Gain insights on assessing relevance and improving daily workflows.
Explore Horusec integration with CICD pipelines and Sonarqube for enhanced security and vulnerability checks in software development.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Learn ethical hacking techniques to evaluate risks, improve security policies, and protect core business operations. Covers vulnerability management, system auditing, application testing, social engineering, and OSINT.
Identify, assess, and respond to cybersecurity threats and vulnerabilities. Learn vulnerability scanning, penetration testing, and incident response procedures to protect organizations from attacks.
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers
Developing security in the Software Development Life Cycle (SDLC)
Ethical Hacking, Penetration Testing (Pentest+), Bug Bounty, Metasploit , Free Hacking Tools as Nmap for ethical hacker
Learn ethical hacking, penetration testing and network security while working on Python coding projects!
Scan networks with vulnerabilities by using Nmap; Nessus. Master Cyber Security, ethical hacking, network hacking skills
Get personalized course recommendations, track subjects and courses with reminders, and more.