As cyber threats grow in sophistication, organizations can no longer treat application security as an afterthought. This course equips software developers, cybersecurity professionals, and DevSecOps teams to embed security throughout the software development lifecycle (SDLC). You’ll master practical, up-to-date techniques aligned with industry frameworks from NIST, OWASP, CISA, and CSA.

noch 4 Tage: Holen Sie sich einen Black Friday Boost mit $160 Rabatt auf 10.000+ Programme.Sparen Sie jetzt.


Empfohlene Erfahrung
Was Sie lernen werden
Apply secure coding practices and OWASP top 10 prevention techniques to eliminate vulnerabilities during development phases.
Analyze application architectures to identify critical security threats and design comprehensive threat models for risk mitigation.
Evaluate software supply chains and implement security controls for open-source components, dependencies, and vendor relationships.
Design secure cloud-native and container architectures with automated monitoring and compliance validation capabilities.
Kompetenzen, die Sie erwerben
- Kategorie: Dependency Analysis
- Kategorie: Software Development
- Kategorie: Infrastructure as Code (IaC)
- Kategorie: Security Controls
- Kategorie: Containerization
- Kategorie: CI/CD
- Kategorie: Supply Chain
- Kategorie: Cybersecurity
- Kategorie: Open Web Application Security Project (OWASP)
- Kategorie: Threat Modeling
- Kategorie: Cloud Standards
- Kategorie: Application Security
- Kategorie: Continuous Monitoring
- Kategorie: Secure Coding
- Kategorie: Cloud Security
- Kategorie: Application Development
- Kategorie: DevSecOps
- Kategorie: Security Testing
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
Oktober 2025
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 6 Module
In this course, you’ll learn how to implement advanced application security practices by embedding security throughout the software development lifecycle (SDLC). You’ll focus on real-world techniques such as secure coding, vulnerability assessment, and DevSecOps integration to anticipate and prevent cyber threats. Through expert instruction, case studies, and hands-on exercises, you’ll gain the skills to apply security controls, integrate automated security testing into pipelines, and align practices with industry standards. By the end of this course, you’ll be equipped to strengthen organizational resilience, reduce risk exposure, and lead proactive application security initiatives that protect software across cloud, mobile, IoT, and enterprise environments.
Das ist alles enthalten
1 Video1 Lektüre
In this module, you’ll learn how to embed security directly into your applications and development processes. You’ll explore Secure by Design principles, secure coding techniques, and secure configuration practices to prevent critical vulnerabilities. Through practical demonstrations, static and dynamic application security testing, and runtime protection strategies, you’ll develop the skills to identify, mitigate, and manage vulnerabilities throughout the software development lifecycle. This module emphasizes proactive security practices aligned with industry standards such as OWASP Top 10 and SANS Top 25 to ensure robust, production-ready applications.
Das ist alles enthalten
10 Videos1 Lektüre1 Aufgabe1 peer review2 Diskussionsthemen
In this module, you’ll learn how to systematically identify and analyze security threats before they become costly vulnerabilities. You’ll explore industry-standard methodologies, including STRIDE, and gain hands-on experience with threat modeling tools like OWASP Threat Dragon, attack trees, and Rapid Threat Modeling Prototyping (RTMP). By applying these techniques to real-world scenarios, you’ll develop the skills to anticipate attack vectors, prioritize risks using OWASP and CVSS frameworks, and translate findings into actionable security controls that strengthen application defenses from design through deployment.
Das ist alles enthalten
10 Videos1 Lektüre1 Aufgabe1 peer review1 Diskussionsthema
In this module, you’ll learn how to secure the software supply chain and CI/CD pipelines critical to modern development. You’ll explore techniques for evaluating and securing open-source components, third-party dependencies, and vendor relationships while integrating automated security testing throughout development pipelines. Hands-on exercises with Software Bill of Materials (SBOM) creation, dependency management, and monitoring tools equip you to prevent supply chain attacks, ensure compliance with industry standards, and maintain secure DevOps workflows without slowing delivery.
Das ist alles enthalten
10 Videos1 Lektüre1 Aufgabe1 peer review2 Diskussionsthemen
In this module, you’ll learn how to secure cloud-native applications, containers, and serverless environments while implementing continuous monitoring and governance. You’ll explore cloud security architectures using CSA Cloud Controls Matrix standards, container and runtime security practices, and Infrastructure-as-Code (IaC) automation for secure deployments. Hands-on exercises with monitoring tools, Kubernetes RBAC, and secrets management help you protect dynamic cloud workloads, detect threats in real time, and maintain compliance across hybrid and multi-cloud environments.
Das ist alles enthalten
10 Videos1 Lektüre1 Aufgabe1 peer review2 Diskussionsthemen
In this final module, you will synthesize your learning across secure coding, threat modeling, supply chain protection, and cloud-native security practices. You’ll bring these core concepts together in a hands-on capstone project where you will perform a complete threat modeling exercise using OWASP Threat Dragon. This project demonstrates your ability to identify risks, design effective mitigations, and integrate security into the software development lifecycle. By the end, you will be prepared to showcase your expertise in applying industry-standard frameworks and tools to build secure, resilient applications that align with both technical requirements and organizational goals.
Das ist alles enthalten
1 Video1 peer review
von
Mehr von Security entdecken
Status: Kostenloser Testzeitraum
Status: Vorschau
Warum entscheiden sich Menschen für Coursera für ihre Karriere?





Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Weitere Fragen
Finanzielle Unterstützung verfügbar,
¹ Einige Aufgaben in diesem Kurs werden mit AI bewertet. Für diese Aufgaben werden Ihre Daten in Übereinstimmung mit Datenschutzhinweis von Courseraverwendet.





