Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security software"
Skills you'll gain: Data Warehousing, SQL, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, MySQL, PostgreSQL, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Database Architecture and Administration, Data Transformation, IBM DB2, Relational Databases, Jupyter, Generative AI
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Java, Hypertext Markup Language (HTML), Software Design, Data Structures, Debugging, Web Design and Development, Software Engineering, Cryptography, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Encryption, Algorithms, Program Development, Web Applications, Front-End Web Development, Statistical Analysis, Computer Programming
Skills you'll gain: Authentications, Secure Coding, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Cybersecurity, Node.JS, Front-End Web Development
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
DeepLearning.AI
Skills you'll gain: Database Design, Software Documentation, Software Design Patterns, Database Systems, Software Testing, ChatGPT, Technical Documentation, Generative AI, Software Design, Code Review, Software Architecture, Software Systems, System Design and Implementation, Dependency Analysis, Artificial Intelligence, Software Development Tools, OpenAI, Software Development, Natural Language Processing, Debugging
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Hardware Troubleshooting, Computer Hardware, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Peripheral Devices
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Software Development, Process Driven Development, Waterfall Methodology, Software Testing, Scrum (Software Development), Release Management, Development Testing, Maintainability
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
In summary, here are 10 of our most popular security software courses
- IBM Relational Database Administrator: IBM
- Java Programming and Software Engineering Fundamentals: Duke University
- JavaScript Security Refreshers: Infosec
- Hands-On Labs in Google Cloud for Security Engineers: Google Cloud
- Generative AI for Software Development: DeepLearning.AI
- IBM and ISC2 Cybersecurity Specialist: IBM
- Security and Risk Management: Packt
- Proactive Computer Security: University of Colorado System
- Systems and Application Security: ISC2
- Software Development Processes and Methodologies: University of Minnesota