• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Implementation

Results for "security implementation"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Microsoft

    Security, Testing, and Deployment

    Skills you'll gain: CI/CD, Continuous Deployment, Application Deployment, Cloud Deployment, Restful API, Middleware, Continuous Integration, Software Testing, API Design, Azure DevOps, Postman API Platform, API Testing, .NET Framework, Microservices

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Agentic AI Development & Security

    Skills you'll gain: AI Security, Threat Modeling, Open Web Application Security Project (OWASP), Security Testing, Retrieval-Augmented Generation, Software Architecture, API Design, Test Automation, Vulnerability Management, Agentic systems, Systems Design, Model Evaluation, Test Driven Development (TDD), CI/CD, Python Programming, Continuous Deployment, Dependency Analysis, Large Language Modeling, Machine Learning, Performance Analysis

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CSC: Secure Software Development and Implementation

    Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Engineering, Security Requirements Analysis, Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Information Privacy, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Analyze, Create, and Evaluate Cloud Security

    Skills you'll gain: Cloud Security, DevSecOps, Security Controls, Security Information and Event Management (SIEM), AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Cyber Security Assessment, Identity and Access Management, Cyber Security Policies, Cloud Computing, Vulnerability Management, Continuous Monitoring, Network Security, NIST 800-53, Authorization (Computing), Threat Detection, Auditing, Encryption

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Introduction to Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Implementing Open Policy Agent for Policy-Driven Control

    Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Open Source Technology, Cross Platform Development, Configuration Management, JSON

    Intermediate · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    657 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Mastering ISO 27001 Controls: Implementation and Auditing

    Skills you'll gain: ISO/IEC 27001, Auditing, Audit Planning, Security Controls, Security Management, Information Systems Security, Information Assurance, Risk Management, Risk Management Framework, Security Strategy, Security Requirements Analysis, Identity and Access Management, Security Awareness, Information Technology

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    The Security Consultant's Handbook

    Skills you'll gain: Law, Regulation, and Compliance, Business Risk Management, Consulting, Risk Management, Investigation, Business Consulting, Cyber Security Policies, Security Management, Crisis Management, Enterprise Security, Threat Management, Compliance Management, Entrepreneurship, Safety and Security, Case Studies

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Compliance Framework, Standards & Regulations

    Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Responsible AI, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Business Implementation and Security

    Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Vulnerability Assessments, Enterprise Security, Regulation and Legal Compliance, Data Security, Application Frameworks, Cybersecurity, Emerging Technologies, Distributed Computing, Transaction Processing

    Beginner · Course · 1 - 4 Weeks

  • M

    Microsoft

    Enterprise Power BI: Deployment, Security, and Integration

    Skills you'll gain: Power BI, Azure Synapse Analytics, Microsoft Azure, Governance, Real Time Data, Enterprise Architecture, Application Deployment, Data Architecture, DevOps, Database Architecture and Administration, Data Integration, Data Security, Microsoft 365, Role-Based Access Control (RBAC), Scalability, Collaborative Software, Version Control

    Intermediate · Course · 1 - 3 Months

1234…314

In summary, here are 10 of our most popular security implementation courses

  • Security, Testing, and Deployment: Microsoft
  • Agentic AI Development & Security: Coursera
  • CSC: Secure Software Development and Implementation: CertNexus
  • Analyze, Create, and Evaluate Cloud Security: Coursera
  • Introduction to Applied Cryptography: University of Colorado System
  • Implementing Open Policy Agent for Policy-Driven Control: Coursera
  • Advanced System Security Design: University of Colorado System
  • Mastering ISO 27001 Controls: Implementation and Auditing: Packt
  • The Security Consultant's Handbook: Packt
  • Cybersecurity Compliance Framework, Standards & Regulations: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok