Application Security courses can help you learn secure coding practices, threat modeling, vulnerability assessment, and incident response strategies. You can build skills in risk analysis, secure software development lifecycle (SDLC) integration, and penetration testing techniques. Many courses introduce tools like OWASP ZAP, Burp Suite, and static analysis tools, showing how these resources are used to identify and mitigate security risks in applications.

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Authentications, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Firewall, Role-Based Access Control (RBAC), Authorization (Computing), Virtual Private Networks (VPN), Network Security, Data Security, Infrastructure Security, Load Balancing
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Security Controls, Role-Based Access Control (RBAC), Authentications, Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Virtual Machines, Key Management
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud Computing, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Secure Coding, Cloud API, Cloud Development, Database Development, Application Deployment, Database Management, Server Side, Web Applications, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Standards
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cloud Management, IT Security Architecture, Data Centers, Risk Management Framework, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks