Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "securing applications"
- Status: NewStatus: Free Trial
Skills you'll gain: DevSecOps, Microsoft Azure, Zero Trust Network Access, Cloud Security, Threat Modeling, Cloud Computing Architecture, Security Strategy, Cybersecurity, Enterprise Security, Continuous Monitoring, Identity and Access Management, Disaster Recovery
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Unix, Computer Security, Application Security, Vulnerability Assessments, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, OS Process Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Computer Security, Server Administration, System Configuration, Encryption, Network Planning And Design, Computer Networking
- Status: Preview
Skills you'll gain: Application Security, Secure Coding, Threat Modeling, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
Searches related to securing applications
In summary, here are 6 of our most popular securing applications courses
- Design solutions with security best practices and priorities:Â Whizlabs
- Fundamentals of Information System Security Architecture:Â LearnQuest
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Windows Server Management and Security:Â University of Colorado System
- Certified Secure Software Lifecycle Professional (CSSLP):Â Infosec
- Protecting APIs with Apigee X and Cloud Armor:Â Google Cloud