Software security courses can help you learn secure coding practices, vulnerability assessment, threat modeling, and incident response strategies. You can build skills in risk analysis, penetration testing, and implementing security protocols across various software environments. Many courses introduce tools like static and dynamic analysis software, intrusion detection systems, and security frameworks, showing how these tools enhance your ability to protect applications from potential threats.

Universitat de Barcelona
Skills you'll gain: Telecommunications, Time Series Analysis and Forecasting, Safety Assurance, Predictive Modeling, Communication Systems, Mathematical Modeling, Safety Standards, Digital Communications
Intermediate · Course · 1 - 3 Months

Knowledge Accelerators
Skills you'll gain: Data Presentation, Data Entry, Data Processing, Data Science, Organizational Skills, Business Analytics, Data Management, Business Intelligence, Microsoft 365, Productivity Software, Record Keeping, Customer Data Management, Productivity, Financial Analysis, Marketing Planning, Project Management, Event Planning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Management Framework, Risk Mitigation, Governance Risk Management and Compliance, Legal Risk, Blockchain, IT Security Architecture, Cyber Risk, Information Technology Architecture, Governance, Application Security, Project Documentation, Technical Documentation, Regulatory Compliance, Software Documentation, Law, Regulation, and Compliance, Solution Architecture, Cyber Governance
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Artificial Neural Networks, Program Development, Applied Machine Learning, Deep Learning, Software Development, Image Analysis, Linear Algebra, Mathematical Software, Machine Learning, Digital Signal Processing, Data Processing, Data Structures, Data Transformation, Algorithms, Data Science
Intermediate · Course · 1 - 3 Months

Peking University
Skills you'll gain: Legal Research, Legal Writing, Research, Writing, Research Methodologies, Layout Design, Databases
Mixed · Course · 1 - 3 Months

Infosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Security Controls, Data Security, Endpoint Security, Cryptography, Authentications, Query Languages, Computer Programming
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Management, Security Management, Digital Forensics, Disaster Recovery, Risk Management Framework, Cybersecurity, Risk Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Cloud Security, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

Peking University
Skills you'll gain: Language Interpretation, Translation, and Studies, Quality Assurance, Natural Language Processing, Multilingualism, Information Technology, Vocabulary
Intermediate · Course · 3 - 6 Months
Codio
Skills you'll gain: Apache Maven, Build Tools, JSON, JUnit, Java Programming, Java, Web Services, Programming Principles, Package and Software Management, Data Structures, Object Oriented Programming (OOP), Network Protocols, Unit Testing, Style Guides
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Docker (Software), Network Troubleshooting, Containerization, Cloud Infrastructure, Application Deployment, Scalability, Virtual Networking, Role-Based Access Control (RBAC), Network Monitoring, System Monitoring, Configuration Management, Software Installation, Data Persistence
Intermediate · Course · 1 - 3 Months

Tsinghua University
Skills you'll gain: Data Structures, Algorithms, Graph Theory, Computational Thinking, Theoretical Computer Science, Database Management Systems, System Design and Implementation, Programming Principles, Computer Programming, Data Storage
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Enterprise Architecture, Security Architecture Review, Cybersecurity, Application Security, Cyber Security Strategy, Network Security, Systems Architecture, Identity and Access Management, Information Systems Security, Endpoint Security, Data Security, Risk Analysis, Remote Access Systems, Risk Mitigation, Case Studies, Risk Management, Business Requirements
Intermediate · Course · 1 - 3 Months