• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Implementation

Results for "security implementation"


  • L

    LearnKartS

    CISM Certification Preparation

    Skills you'll gain: Risk Management, Risk Analysis, Enterprise Risk Management (ERM), Risk Management Framework, Incident Management, Incident Response, Cyber Governance, Risk Modeling, Risk Appetite, Computer Security Incident Management, Business Risk Management, Security Management, Security Controls, Threat Management, Disaster Recovery, Information Management, Security Awareness, Vendor Management, Program Evaluation, Continuous Improvement Process

    Beginner · Specialization · 3 - 6 Months

  • S

    Starweaver

    AI Leadership & Strategic Implementation

    Skills you'll gain: Responsible AI, AI Enablement, Technology Roadmaps, Organizational Change, AI Product Strategy, Stakeholder Engagement, Market Opportunities, Change Management, Google Gemini, Business Strategy, Generative AI, Corporate Strategy, Corporate Communications, Enterprise Security, Prompt Engineering, Corporate Sustainability, Business Communication, Communication Strategies, Marketing Strategy and Techniques, Communication

    3.8
    Rating, 3.8 out of 5 stars
    ·
    34 reviews

    Intermediate · Specialization · 1 - 4 Weeks

  • L

    LearnKartS

    Information Security Program Management

    Skills you'll gain: Security Management, Security Controls, Asset Management, Security Strategy, IT Management, Program Management, Security Awareness, Computer Security Awareness Training, IT Security Architecture, Information Management, Cyber Security Policies, Product Roadmaps, Continuous Monitoring, Compliance Management, Cybersecurity, Program Development, Vendor Management, Risk Management, Quality Management, Continuous Improvement Process

    Mixed · Course · 1 - 3 Months

  • M

    Microsoft

    Implement Platform Protection

    Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Security Strategy, Role-Based Access Control (RBAC), Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Deployment, Virtual Private Networks (VPN), Encryption, Virtual Networking

    4.8
    Rating, 4.8 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    ISC2

    Foundations of Software Lifecycle Development and Security

    Skills you'll gain: IT Security Architecture, Systems Development Life Cycle, Security Controls, Software Testing, Security Management, Software Development, Cybersecurity, Data Security, Continuous Monitoring, Risk Management Framework, Authorization (Computing), Identity and Access Management

    Beginner · Course · 1 - 3 Months

  • M

    Microsoft

    Enterprise Power BI: Deployment, Security, and Integration

    Skills you'll gain: Power BI, Microsoft Power Platform, DevOps, Microsoft Azure, Application Deployment, Enterprise Architecture, Real Time Data, Business Intelligence, Collaborative Software, Role-Based Access Control (RBAC), Scalability, Data Integration, Data Governance, Data Modeling, System Configuration, Collaboration, Analytics, Compliance Management, Data Sharing, Problem Solving

    Intermediate · Course · 1 - 3 Months

What brings you to Coursera today?

  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    ISC2

    Foundations of Governance, Risk, and Compliance

    Skills you'll gain: Security Controls, Governance Risk Management and Compliance, Risk Management, Business Risk Management, Compliance Management, Compliance Auditing, Enterprise Risk Management (ERM), Data Security, Information Privacy, Continuous Monitoring, Auditing, Information Systems Security, Regulatory Compliance, Verification And Validation, Risk Analysis, Document Management, Scope Management, Asset Protection

    Beginner · Course · 1 - 3 Months

  • S

    Starweaver

    Securing Cloud Operations

    Skills you'll gain: Cloud Security, Cloud Services, Cloud Technologies, Cloud Computing Architecture, Cloud Computing, Cloud Infrastructure, Incident Response, Hardening, Public Cloud, Infrastructure As A Service (IaaS), ISO/IEC 27001, Virtual Machines, Identity and Access Management, Security Controls, Amazon Web Services, NIST 800-53, Network Security, Cloud Applications, Role-Based Access Control (RBAC), Platform As A Service (PaaS)

    Intermediate · Course · 1 - 3 Months

  • C

    Cisco Learning and Certifications

    Security Operations Center (SOC)

    Skills you'll gain: Threat Detection, Workflow Management, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Computer Security Incident Management, Cyber Attacks, Infrastructure Security, Event Monitoring, Data Security, Performance Measurement, Automation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    354 reviews

    Mixed · Course · 1 - 3 Months

  • I

    Illinois Tech

    Security: A Comprehensive Approach

    Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    33 reviews

    Intermediate · Specialization · 3 - 6 Months

  • C

    Coursera

    Securing Applications with Checkmarx

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming

    Intermediate · Course · 1 - 4 Weeks

1234…356

In summary, here are 10 of our most popular security implementation courses

  • CISM Certification Preparation: LearnKartS
  • AI Leadership & Strategic Implementation: Starweaver
  • Information Security Program Management: LearnKartS
  • Implement Platform Protection: Microsoft
  • Foundations of Software Lifecycle Development and Security: ISC2
  • Enterprise Power BI: Deployment, Security, and Integration: Microsoft
  • Secure Coding Practices: University of California, Davis
  • Foundations of Governance, Risk, and Compliance: ISC2
  • Securing Cloud Operations: Starweaver
  • Security Operations Center (SOC): Cisco Learning and Certifications

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok