• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Applying Security Best Practices

Results for "applying security best practices"


  • Status: Free Trial
    Free Trial
    P

    Packt

    Governance, Risk, and Compliance

    Skills you'll gain: Disaster Recovery, Regulation and Legal Compliance, Risk Management, Compliance Management, Regulatory Compliance, Governance Risk Management and Compliance, Risk Analysis, Cloud Security, Business Continuity, Cyber Risk, Security Management, Vendor Management, Incident Response, Data Security, Personally Identifiable Information, Business Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Managing Information System Security Architecture

    Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Implementing a Risk Management Framework

    Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    The Business of Cybersecurity Capstone

    Skills you'll gain: Security Management, Incident Response, Risk Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Information Management, Business Ethics, Performance Measurement, Compliance Management, Governance, Business Planning, Organizational Strategy

    4.8
    Rating, 4.8 out of 5 stars
    ·
    52 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Managing Incident Response, IAM, and AWS Service Security

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Information and Event Management (SIEM), Security Management, Computer Security Incident Management, Incident Response, Amazon CloudWatch, Application Security, Amazon Elastic Compute Cloud, Amazon S3, Data Access, Multi-Factor Authentication, Configuration Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Apple Platform Security, Integrations, & Management

    Skills you'll gain: Knowledge of Apple Software, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Performance Testing

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Security Architecture

    Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Security Controls, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Foundations of Information Security and Incident Handling

    Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    IT Risk Assessment Practices

    Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Security Foundations, Threats, and Network Protection

    Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework

    4.6
    Rating, 4.6 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

1…789…492

In summary, here are 10 of our most popular applying security best practices courses

  • Governance, Risk, and Compliance: Packt
  • Managing Information System Security Architecture: LearnQuest
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Implementing a Risk Management Framework : Kennesaw State University
  • The Business of Cybersecurity Capstone: Kennesaw State University
  • Managing Incident Response, IAM, and AWS Service Security: Packt
  • Advanced Apple Platform Security, Integrations, & Management: Packt
  • Advanced Security Architecture: Packt
  • Foundations of Information Security and Incident Handling: Packt
  • IT Risk Assessment Practices: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok