Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "software+security"
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Single Sign-On (SSO), Microsoft Azure, Cyber Security Policies, Security Management, Network Security, Identity and Access Management, Data Management, Authentications, System Monitoring, Data Ethics, Cybersecurity
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Cyber Attacks, Security Awareness, Data Security, Threat Modeling, Security Management, Security Strategy, Computer Security Awareness Training, Information Assurance, Wireless Networks, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support
Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Network Security, Hardening, Network Protocols, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
- Status: New
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Data Security, Linux, System Monitoring
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, User Story, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Functional Specification, Scalability
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence
In summary, here are 10 of our most popular software+security courses
- Computer Security and Systems Management: University of Colorado System
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University
- IT Security: Defense against the digital dark arts : Google
- Tools of the Trade: Linux and SQL: Google
- Connect and Protect: Networks and Network Security: Google
- Secure Software Design: University of Colorado System
- Secure Coding Practices: University of California, Davis
- Application Security for Developers and DevOps Professionals: IBM
- Security: A Comprehensive Approach: Illinois Tech