• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Apply Security Best Practices


Results for "apply+security+best+practices"


  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Personnel & Third-Party Security

    Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Secure Your Applications

    Skills you'll gain: Azure Active Directory, Microsoft Azure, Web Applications, Cloud Applications, Application Security, Cloud Security, Identity and Access Management, Authorization (Computing), Key Management, Application Programming Interface (API), Authentications, Encryption

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Mastering Endpoint Security & Threat Defense

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    G

    Google Cloud

    Security Best Practices in Google Cloud - Português

    Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Role-Based Access Control (RBAC), Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Key Management

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    R

    Rice University

    Best Practices in Planning DE&I Interventions

    Skills you'll gain: Diversity Equity and Inclusion Initiatives, Diversity Training, Human Resource Strategy, Strategic Planning, Employee Retention, Diversity and Inclusion, Human Resources, Workplace inclusivity, Recruitment Strategies, Workforce Development, Organizational Effectiveness, Talent Acquisition, Organizational Change

    4.8
    Rating, 4.8 out of 5 stars
    ·
    61 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Solutions and Microsoft Defender

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Cyber Threat Intelligence, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Endpoint Security, Threat Detection, Virtual Networking, Encryption, Event Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    172 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    177 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Security Administration with Cisco Defense Orchestrator

    Skills you'll gain: General Networking, Network Architecture, TCP/IP, Threat Management, Cybersecurity, Network Security, Threat Detection, Network Routers, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security Best Practices in Google Cloud 日本語版

    Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), System Monitoring, Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols

    Intermediate · Course · 1 - 3 Months

1…456…9

In summary, here are 10 of our most popular apply+security+best+practices courses

  • Personnel & Third-Party Security: University of California, Irvine
  • Secure Your Applications: Microsoft
  • Mastering Endpoint Security & Threat Defense : Starweaver
  • Security Best Practices in Google Cloud - Português: Google Cloud
  • Best Practices in Planning DE&I Interventions: Rice University
  • Cybersecurity Solutions and Microsoft Defender: Microsoft
  • Software Security for Web Applications: Codio
  • Cyber Security: Applied Cryptography: Macquarie University
  • Identifying Security Vulnerabilities: University of California, Davis
  • Security Administration with Cisco Defense Orchestrator: LearnQuest

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok