• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Application 20 Security

Results for "application%20security"


  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Certified Kubernetes Application Developer (CKAD)

    Skills you'll gain: Kubernetes, Command-Line Interface, Virtualization

    4.2
    Rating, 4.2 out of 5 stars
    ·
    65 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Microsoft

    Data Management and Application Features

    Skills you'll gain: ASP.NET, Data Migration, Configuration Management, Data Validation, Database Application, Middleware, Debugging, Back-End Web Development, Database Management, Data Modeling, Restful API, Maintainability, Dependency Analysis, Performance Tuning, Software Design Patterns

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Security and Auditing in Ethereum

    Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Cryptography, Network Security, and Application Security

    Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    176 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Cloud Security Fundamentals

    Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Application Security, Cloud Infrastructure, Network Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments

    4.7
    Rating, 4.7 out of 5 stars
    ·
    146 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    B

    Board Infinity

    Security for Artificial Intelligence Software and Services

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing

    3.5
    Rating, 3.5 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Minnesota

    Cloud Application Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Distributed Denial-Of-Service (DDoS) Attacks, Web Services

    4.3
    Rating, 4.3 out of 5 stars
    ·
    27 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL

    Intermediate · Course · 1 - 4 Weeks

1…456…343

In summary, here are 10 of our most popular application%20security courses

  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Certified Kubernetes Application Developer (CKAD): LearnKartS
  • Data Management and Application Features: Microsoft
  • Security and Auditing in Ethereum: EDUCBA
  • Cybersecurity and Secure Software Design: Ball State University
  • Cryptography, Network Security, and Application Security: Packt
  • Identifying Security Vulnerabilities: University of California, Davis
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • Palo Alto Networks Cloud Security Fundamentals: Palo Alto Networks
  • Security for Artificial Intelligence Software and Services: Board Infinity

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok