Learn software security principles for protecting applications. Understand how to identify vulnerabilities, implement security measures, and perform security testing.
The language used throughout the course, in both instruction and assessments.

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Security Controls, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Infrastructure, Google Cloud Platform, Authentications, Cloud Applications, Identity and Access Management, Kubernetes, Cloud Security, Data Loss Prevention, Infrastructure As A Service (IaaS), Cloud Services, Cloud Computing, Threat Management, Encryption, Network Infrastructure, Generative AI, OAuth, Cloud Storage, Security Controls
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Vulnerability Assessments, System Configuration, Security Management
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Design Elements And Principles, Graphic Design, Design, Typography, Adobe InDesign, Content Creation, Design Research, Information Architecture, Color Theory, Adobe Photoshop
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Public Cloud, Network Security, Data Storage, Identity and Access Management, Data Centers, Encryption
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Assessments, Multi-Cloud, Cloud Security, Security Controls, Threat Management, Google Cloud Platform, Cloud Management, Enterprise Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Software-Defined Networking, Wide Area Networks, Network Architecture, Virtual Private Networks (VPN), Network Infrastructure, Network Planning And Design, Network Routing, Network Security, Network Administration, Network Performance Management
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months