Learn software security principles for protecting applications. Understand how to identify vulnerabilities, implement security measures, and perform security testing.
The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Security Management, Program Evaluation, Governance, Social Justice, Policy Analysis, Policy Development, Public Policies, Criminal Investigation and Forensics, Social Work, Community Development, Conflict Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Role-Based Access Control (RBAC), Hardening, Identity and Access Management, Kubernetes, Infrastructure Security, Network Security, Firewall, Security Controls, Authorization (Computing), Linux Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Private Cloud, IT Security Architecture, Security Controls, Network Security, Incident Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Hardening, Identity and Access Management, Authorization (Computing), User Accounts, Security Controls, Patch Management, Authentications
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Authentications, Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Multi-Factor Authentication, Role-Based Access Control (RBAC), Authorization (Computing), Virtual Private Networks (VPN), Firewall, Network Security, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Kubernetes, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Cloud Infrastructure, Cloud Security, Containerization, Authentications, Cloud Services, Virtual Machines, Infrastructure As A Service (IaaS), Generative AI Agents, Data Loss Prevention, Cloud Storage, Network Infrastructure, Application Development, Malware Protection, Cloud Computing, Continuous Monitoring
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Beginner · Specialization · 1 - 3 Months