• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Applying Security Best Practices

Results for "applying security best practices"


  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Strategies for Cloud Security Risk Management

    Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    71 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    ISC2 Systems Security Certified Practitioner (SSCP)

    Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring

    4.7
    Rating, 4.7 out of 5 stars
    ·
    272 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    AWS: Security, Management and Governance

    Skills you'll gain: AWS Kinesis, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, Identity and Access Management, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption, Multi-Factor Authentication

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Distributed Query Optimization and Security

    Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities in C/C++Programming

    Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    80 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Gemini for Security Engineers - Français

    Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Vulnerability Assessments, System Configuration, Security Management

    Beginner · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Gemini for Security Engineers - 한국어

    Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Generative AI, Cloud Computing, Application Deployment, Security Engineering, Security Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Network Security Fundamentals

    Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service

    4.7
    Rating, 4.7 out of 5 stars
    ·
    213 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Certified Information Systems Security Professional (CISSP)

    Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    51 reviews

    Advanced · Specialization · 3 - 6 Months

  • G

    Google Cloud

    Memulai Security Command Center Enterprise

    Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Assessments, Multi-Cloud, Cloud Security, Security Controls, Threat Management, Google Cloud Platform, Cloud Management, Enterprise Security, Security Information and Event Management (SIEM)

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Networking and Security in iOS Applications

    Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography

    4.5
    Rating, 4.5 out of 5 stars
    ·
    255 reviews

    Mixed · Course · 1 - 4 Weeks

1…343536…492

In summary, here are 10 of our most popular applying security best practices courses

  • Strategies for Cloud Security Risk Management: Google Cloud
  • ISC2 Systems Security Certified Practitioner (SSCP): ISC2
  • AWS: Security, Management and Governance: Whizlabs
  • Distributed Query Optimization and Security: Johns Hopkins University
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
  • Gemini for Security Engineers - Français: Google Cloud
  • Gemini for Security Engineers - 한국어: Google Cloud
  • Palo Alto Networks Network Security Fundamentals: Palo Alto Networks
  • Certified Information Systems Security Professional (CISSP): Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok