• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Spring Security Configuration

Results for "spring security configuration"


  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    176 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Managing Network Security

    Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Security Awareness, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection

    4.8
    Rating, 4.8 out of 5 stars
    ·
    238 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Security and Automation

    Skills you'll gain: Salesforce, Salesforce Development, Workflow Management, Data Access, Role-Based Access Control (RBAC), Data Sharing, Process Design, Authorization (Computing), Business Process, Application Security, Identity and Access Management, Data Security, Automation, Business Process Automation, User Accounts, Security Controls, Operational Efficiency

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

    Build toward a degree

    4.8
    Rating, 4.8 out of 5 stars
    ·
    20 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Network Security, Compliance and Governance

    Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, AWS Identity and Access Management (IAM), Encryption, Network Security, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Data Protection and Security Governance

    Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon S3, Amazon CloudWatch, Data Encryption Standard, AWS CloudFormation, Infrastructure as Code (IaC), Public Key Infrastructure, Configuration Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Resilient Solutions and Security Controls

    Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Laravel: Configure, Validate, Authenticate and Authorize

    Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Cybersecurity, Data Loss Prevention, Identity and Access Management, Code Review, Software Installation, Middleware, Debugging, Computer Programming, Information Technology

    4.6
    Rating, 4.6 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Security and Key Management

    Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Implementing a Risk Management Framework

    Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Splunk Administration and Advanced Topics

    Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis, Authentications, Data Collection, Configuration Management

    4.8
    Rating, 4.8 out of 5 stars
    ·
    49 reviews

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Security Governance, Compliance & Risk Management

    Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management

    Advanced · Course · 1 - 4 Weeks

1…789…316

In summary, here are 10 of our most popular spring security configuration courses

  • Identifying Security Vulnerabilities: University of California, Davis
  • Managing Network Security: Kennesaw State University
  • Security and Automation: LearnKartS
  • Cyber Security Technologies: Illinois Tech
  • AWS: Network Security, Compliance and Governance: Whizlabs
  • AWS: Data Protection and Security Governance: Whizlabs
  • AWS: Resilient Solutions and Security Controls: Whizlabs
  • Laravel: Configure, Validate, Authenticate and Authorize: Infosec
  • AWS: Security and Key Management: Whizlabs
  • Implementing a Risk Management Framework : Kennesaw State University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok