• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Implementation

Results for "security implementation"


  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

  • J

    Johns Hopkins University

    Introduction to DevSecOps

    Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Version Control, Git (Version Control System), Process Improvement, Software Development, IT Automation, Digital Transformation, Business Transformation, Cross-Functional Collaboration, Continuous Improvement Process, Agile Methodology

    4.1
    Rating, 4.1 out of 5 stars
    ·
    20 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    ISC2

    Security Operations

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    200 reviews

    Beginner · Course · 1 - 3 Months

  • C

    Coursera

    Agentic AI Development & Security

    Skills you'll gain: AI Security, Threat Modeling, Open Web Application Security Project (OWASP), Security Testing, Retrieval-Augmented Generation, Software Architecture, API Design, Test Automation, Vulnerability Management, Agentic systems, Systems Design, Model Evaluation, Test Driven Development (TDD), CI/CD, Python Programming, Continuous Deployment, Dependency Analysis, Large Language Modeling, Machine Learning, Performance Analysis

    Intermediate · Specialization · 3 - 6 Months

  • C

    Copenhagen Business School

    Strategy Implementation

    Skills you'll gain: Goal Setting, Organizational Strategy, Organizational Structure, Strategic Planning, Business Strategy, Culture Transformation, Change Management, Organizational Change, Strategic Communication, Risk Management, Key Performance Indicators (KPIs), Performance Management, Professional Networking, Cross-Functional Collaboration, Influencing

    4.6
    Rating, 4.6 out of 5 stars
    ·
    951 reviews

    Mixed · Course · 1 - 3 Months

  • U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    658 reviews

    Beginner · Specialization · 3 - 6 Months

  • M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Testing, Security Controls, Cyber Security Strategy, Cybersecurity, Infrastructure as Code (IaC), Vulnerability Management

    Beginner · Course · 1 - 3 Months

  • I

    ISC2

    Security Concepts and Practices

    Skills you'll gain: Security Controls, Security Awareness, Change Control, Computer Security Awareness Training, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Data Ethics, Data Integrity, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    111 reviews

    Beginner · Course · 1 - 4 Weeks

  • S

    SkillUp

    Business Implementation and Security

    Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Vulnerability Assessments, Enterprise Security, Regulation and Legal Compliance, Data Security, Application Frameworks, Cybersecurity, Emerging Technologies, Distributed Computing, Transaction Processing

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    Cryptography

    Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms

    4.8
    Rating, 4.8 out of 5 stars
    ·
    93 reviews

    Beginner · Course · 1 - 4 Weeks

  • L

    LearnQuest

    Fundamentals of Information System Security Architecture

    Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Security Requirements Analysis, Application Security, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity

    Beginner · Course · 1 - 4 Weeks

  • C

    Codio

    Software Security for Web Applications

    Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy

    4.9
    Rating, 4.9 out of 5 stars
    ·
    17 reviews

    Intermediate · Course · 1 - 4 Weeks

1234…357

In summary, here are 10 of our most popular security implementation courses

  • Secure Coding Practices: University of California, Davis
  • Introduction to DevSecOps: Johns Hopkins University
  • Security Operations: ISC2
  • Agentic AI Development & Security: Coursera
  • Strategy Implementation: Copenhagen Business School
  • Advanced System Security Design: University of Colorado System
  • Cyber Security: DevSecOps: Macquarie University
  • Security Concepts and Practices: ISC2
  • Business Implementation and Security: SkillUp
  • Cryptography : ISC2

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok