Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure coding practices"
- Status: Preview
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Responsible AI, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Encryption
Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Server Side, Encryption
- Status: Preview
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
- Status: Preview
Coursera Instructor Network
Skills you'll gain: API Design, Back-End Web Development, Secure Coding, Data Security, Application Programming Interface (API), Restful API, Server Side, IT Infrastructure, Application Security, Infrastructure Security, Data Integrity, Servers, OAuth, Cloud Security, Server Administration, System Configuration, Encryption, Authentications, Authorization (Computing)
- Status: Free Trial
Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
- Status: Preview
Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
- Status: Free Trial
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
Skills you'll gain: Blockchain, Cryptography, Application Security, Network Security, Data Security, Security Engineering, Secure Coding, Information Systems Security, Infrastructure Security, Encryption, Cybersecurity, Threat Modeling, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
In summary, here are 10 of our most popular secure coding practices courses
- Security for Artificial Intelligence Software and Services:Â Board Infinity
- A Detailed Guide to the OWASP Top 10:Â Packt
- Cybersecurity and Secure Software Design:Â Ball State University
- Back-End Infrastructure: Servers, Secure APIs and Data:Â Coursera Instructor Network
- Protection of Information Assets:Â Packt
- Data Center Security Management with Microsoft System Center:Â EDUCBA
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- Blockchain Security - Intermediate Practices :Â LearnQuest