• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Applying Security Best Practices In Java Ee

Results for "applying security best practices in java ee"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    S

    Simplilearn

    Cyber Security Hashing Training for Beginners

    Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Brute-force attacks, Authentications, Data Integrity

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Master Java Web Services and REST API with Spring Boot

    Skills you'll gain: Web Services, Restful API, Apache Maven, Spring Boot, Spring Framework, Gradle, Simple Object Access Protocol (SOAP), Java Platform Enterprise Edition (J2EE), Java, API Design, Application Frameworks, Secure Coding, Object-Relational Mapping, Data Persistence, JSON, Extensible Markup Language (XML)

    Intermediate · Course · 3 - 6 Months

  • M

    Microsoft

    Microsoft Azure Management Tools and Security Solutions

    Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Cyber Security Strategy, Distributed Denial-Of-Service (DDoS) Attacks, System Monitoring, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence

    4.7
    Rating, 4.7 out of 5 stars
    ·
    543 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    I

    IBM

    IBM Full Stack Software Developer

    Skills you'll gain: Prompt Engineering, Cloud Deployment, Software Development Life Cycle, Cloud-Native Computing, Istio, Software Architecture, Kubernetes, CI/CD, Cloud Computing Architecture, React Redux, Node.JS, Responsive Web Design, Restful API, Django (Web Framework), Git (Version Control System), Server Side, Hypertext Markup Language (HTML), Cloud Computing, Data Import/Export, Engineering Software

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    59K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Governance, Risk & Compliance

    Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control

    4.7
    Rating, 4.7 out of 5 stars
    ·
    11 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Network Services, Security, and Programmability

    Skills you'll gain: Network Security, Wireless Networks, Network Performance Management, Network Monitoring, Dynamic Host Configuration Protocol (DHCP), Ansible, Network Administration, Firewall, Software-Defined Networking, Network Planning And Design, Network Infrastructure, Network Protocols, Infrastructure as Code (IaC), Terraform, Configuration Management, Encryption

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Advanced · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    C

    Codio

    Understanding ISO Security Standards for Your Organization

    Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Enterprise Risk Management (ERM), Business Risk Management, Security Controls, System Implementation, Security Awareness, Information Privacy, Security Management, Security Strategy

    4.7
    Rating, 4.7 out of 5 stars
    ·
    55 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Fundamentals of Data Governance Ownership, Privacy, Security

    Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Data Integrity, Risk Mitigation, Risk Analysis, Cross-Functional Collaboration, Encryption, Accountability

    Beginner · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on GC - Português

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management, Cloud Services

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    V

    VMware

    Networking and Security Architecture with VMware NSX

    Skills you'll gain: NSX-T Network Virtualization, Virtual Networking, Virtualization, Network Architecture, Disaster Recovery, Software-Defined Networking, Network Security, Business Continuity Planning, IT Automation, Firewall, Network Routing, Business Transformation, Application Security, Hybrid Cloud Computing

    4.7
    Rating, 4.7 out of 5 stars
    ·
    464 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Learn to Teach Java: Sequences, Primitive Types and Using Objects

    Skills you'll gain: Debugging, Object Oriented Programming (OOP), Java, Teaching, Programming Principles, Computer Programming, Integrated Development Environments, Digital pedagogy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    38 reviews

    Beginner · Course · 1 - 3 Months

  • C

    Coursera

    Web Application Security Testing with OWASP ZAP

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping

    4.3
    Rating, 4.3 out of 5 stars
    ·
    289 reviews

    Intermediate · Guided Project · Less Than 2 Hours

1…626364…834

In summary, here are 10 of our most popular applying security best practices in java ee courses

  • Cyber Security Hashing Training for Beginners: Simplilearn
  • Master Java Web Services and REST API with Spring Boot: Packt
  • Microsoft Azure Management Tools and Security Solutions: Microsoft
  • IBM Full Stack Software Developer: IBM
  • Cyber Security: Essentials for Governance, Risk & Compliance: Macquarie University
  • Advanced Network Services, Security, and Programmability: Packt
  • Understanding ISO Security Standards for Your Organization: Codio
  • Fundamentals of Data Governance Ownership, Privacy, Security: Coursera
  • Mitigating Security Vulnerabilities on GC - Português: Google Cloud
  • Networking and Security Architecture with VMware NSX: VMware

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok