More to explore:

All Results

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Scanning, Risk Mitigation, Cyber Security Assessment, Vulnerability Management, Cyber Attacks, Security Engineering, Risk Analysis, Web Applications, Security Awareness, Computer Security, Security Management, Cyber Security Strategy, Authentications, Software Development, Linux, Linux Commands

  • Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping

  • Skills you'll gain: Cryptographic Protocols, Application Design, Exploitation techniques, Event Monitoring, Intrusion Detection and Prevention, Server Side, Continuous Monitoring, Computer Security Incident Management, System Monitoring, System Configuration

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Operational Risk, Application Security, Security Requirements Analysis, Threat Management, Cyber Security Policies, Cyber Attacks, Web Applications, Security Management, Vulnerability Assessments, Security Software, Security Engineering, Security Controls, Scenario Testing, Software Development, Data Manipulation

  • Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Controls, Vulnerability Assessments, Authorization (Computing), Hardening, Cryptographic Protocols, Cryptography, Authentications, Exploitation techniques

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

What brings you to Coursera today?

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Secure Coding, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Incident Response

  • Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Exploitation techniques, Data Integrity, Continuous Monitoring, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Incident Response, Server Side, CI/CD

  • Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Vulnerability Assessments, Application Security, Vulnerability Management, Security Controls, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design

  • University of Minnesota

    Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Cloud Computing Architecture, Cryptography, Cryptographic Protocols, Web Servers, Transaction Processing, Server Side

  • Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Back-End Web Development, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy, Package and Software Management, Patch Management

  • Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML), Threat Detection