• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Applying Security Best Practices

Results for "applying security best practices"


  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    GCP Security and Networking

    Skills you'll gain: Identity and Access Management, Network Monitoring, Google Cloud Platform, Virtual Private Networks (VPN), General Networking, Network Troubleshooting, Virtual Local Area Network (VLAN), Network Security, Network Architecture, Network Routing, Cloud Computing, Cloud Security, Firewall, Key Management, Load Balancing, Cloud Storage, DevOps, Encryption, Automation

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Industrial IoT Markets and Security

    Skills you'll gain: Internet Of Things, Real-Time Operating Systems, General Networking, Wireless Networks, Information Systems Security, Application Security, Petroleum Industry, Automation, Network Protocols, Emerging Technologies, Cloud Platforms, Embedded Systems, Market Analysis, Interviewing Skills, Software-Defined Networking, Workforce Development, Platform As A Service (PaaS)

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    616 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Salesforce Security and Layouts

    Skills you'll gain: Salesforce, Authentications, Salesforce Development, Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, Data Security, Authorization (Computing), Event Monitoring, Application Security, Data Sharing, Security Information and Event Management (SIEM), Responsive Web Design, User Accounts, Mobile Development, User Interface (UI)

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Cybersecurity Assessment: CompTIA Security+ & CYSA+

    Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.3K reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    A

    Amazon Web Services

    AWS Security Governance at Scale

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Security Essentials for Modern Developers

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Computer Security and Systems Management

    Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.9K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    132 reviews

    Beginner · Specialization · 3 - 6 Months

  • G

    Google Cloud

    Implementing Security in Dataplex

    Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis

    Beginner · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Enterprise System Management and Security

    Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Computer Networking, Virtual Machines, Enterprise Architecture

    4.7
    Rating, 4.7 out of 5 stars
    ·
    636 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Certified Information Security Manager (CISM)

    Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    21 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques

    4
    Rating, 4 out of 5 stars
    ·
    589 reviews

    Intermediate · Specialization · 3 - 6 Months

1…293031…492

In summary, here are 10 of our most popular applying security best practices courses

  • GCP Security and Networking: LearnKartS
  • Industrial IoT Markets and Security: University of Colorado Boulder
  • Salesforce Security and Layouts: LearnKartS
  • Cybersecurity Assessment: CompTIA Security+ & CYSA+: IBM
  • AWS Security Governance at Scale: Amazon Web Services
  • Security Essentials for Modern Developers: Coursera
  • Computer Security and Systems Management: University of Colorado System
  • Cyber Security – Technology and Governance: Royal Holloway, University of London
  • Implementing Security in Dataplex: Google Cloud
  • Enterprise System Management and Security : University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok