• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Sicherheitsbewusstsein

Results for "sicherheitsbewußtsein"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    CISSP Domain 8: Software development security

    Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Software Testing, DevSecOps, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Database Application, Software Architecture, Agile Methodology

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Advanced · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Seguridad de Google Workspace

    Skills you'll gain: Single Sign-On (SSO), Email Security, Google Workspace, Cloud Security, Security Management, Data Security, Security Controls, Application Security, Mobile Security, Cloud API, API Gateway, Authentications, Multi-Factor Authentication, Identity and Access Management, Enterprise Application Management, Threat Detection

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies

    5
    Rating, 5 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Secure Coding: SSDLC, OWASP & SonarQube Essentials

    Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance

    Build toward a degree

    4.8
    Rating, 4.8 out of 5 stars
    ·
    21 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Previous OWASP Risks

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    P

    Peking University

    操作系统与虚拟化安全

    Skills you'll gain: Application Security, Authorization (Computing), Security Engineering, Threat Modeling, Computer Security, Secure Coding, Information Systems Security, Operating Systems, Infrastructure Security, Security Requirements Analysis, Security Testing, Virtualization, Identity and Access Management, Cryptography, Virtual Machines

    3.7
    Rating, 3.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    What Is Cybersecurity?

    Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    16 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cybersecurity Policy Foundations

    Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness

    4.6
    Rating, 4.6 out of 5 stars
    ·
    114 reviews

    Mixed · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Detect and Investigate Threats with Security Command Center

    Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud

    Intermediate · Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

1…6789

In summary, here are 10 of our most popular sicherheitsbewußtsein courses

  • CISSP Domain 8: Software development security: Infosec
  • Seguridad de Google Workspace: Google Cloud
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University
  • Secure Coding: SSDLC, OWASP & SonarQube Essentials: Coursera
  • Cyber Security Technologies: Illinois Tech
  • Previous OWASP Risks: Infosec
  • 操作系统与虚拟化安全: Peking University
  • What Is Cybersecurity?: Kennesaw State University
  • Cyber Secure Coder (CSC-110) : Packt
  • Cybersecurity Policy Foundations: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok