Learn software security principles for protecting applications. Understand how to identify vulnerabilities, implement security measures, and perform security testing.
The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), Automation, Event Monitoring, Cyber Threat Hunting, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Data Analysis Software, Artificial Intelligence and Machine Learning (AI/ML)
Beginner · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months
Skills you'll gain: Service Level Agreement, Software As A Service, Cloud Services, Cloud Computing, Cloud Computing Architecture, Public Cloud, Cloud Solutions, Cloud Applications, Service Level, Business Software, Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Collaborative Software, Product Demonstration, Growth Strategies, Scalability
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Security Strategy, Enterprise Security, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Monitoring, Azure Active Directory, Virtual Private Networks (VPN), Continuous Monitoring, Remote Access Systems, Configuration Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Information Privacy
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks