Software security courses can help you learn secure coding practices, vulnerability assessment, threat modeling, and incident response strategies. You can build skills in risk analysis, penetration testing, and implementing security protocols across various software environments. Many courses introduce tools like static and dynamic analysis software, intrusion detection systems, and security frameworks, showing how these tools enhance your ability to protect applications from potential threats.

Skills you'll gain: Responsive Web Design, HTML and CSS, Web Design and Development, UI Components, Prompt Engineering, Web Development Tools, Web Development, Generative AI, Javascript, Software Engineering, Machine Learning
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Endpoint Security, Computer Security Incident Management, Mobile Security, Security Awareness, Malware Protection, Operating System Administration, Email Security, Android (Operating System), Data Maintenance, Multi-Factor Authentication, System Configuration, Apple iOS, Hardware Troubleshooting, Network Administration, Authentications, Change Control
Beginner · Course · 1 - 3 Months

Skills you'll gain: Scrum (Software Development), Agile Project Management, Agile Methodology, Sprint Planning, Sprint Retrospectives, Scalability, Coordinating, Program Management, Stakeholder Engagement, Influencing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Hybrid Cloud Computing, Cloud Management, Cloud Computing, Site Reliability Engineering, Terraform, Multi-Cloud, System Monitoring, DevSecOps, Identity and Access Management, Ansible, Continuous Monitoring, Grafana, Zero Trust Network Access, Encryption, Disaster Recovery
Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Encryption
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Service Level Agreement, Software As A Service, Cloud Deployment, Cloud Services, Cloud Computing, Cloud Solutions, Cloud Applications, Business Software, Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Collaborative Software, Product Demonstration, Growth Strategies, Software Development Tools
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Security Testing, Network Security, Data Security, Cryptography, Transaction Processing, Malware Protection, Command-Line Interface, Encryption, Key Management, Scripting, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Intermediate · Course · 1 - 4 Weeks