In today’s DevSecOps environments, security testing can’t wait until production. Securing Applications with Checkmarx + ZAP teaches you how to integrate dynamic application security testing (DAST) directly into your development pipeline and make sense of the results. Through realistic, scenario-based labs, you’ll deploy and automate OWASP ZAP scans, interpret vulnerability reports, tune alert filters, and verify remediation through hands-on experimentation. You’ll also learn to synthesize technical findings into executive-level insights using simple frameworks like “What / So What / Now What.

Securing Applications with Checkmarx

Recommended experience
What you'll learn
Install Checkmarx ZAP and Docker for Desktop for code testing and analyze scan results and export actionable reports.
Differentiate DAST from SAST and set up Zap.
Describe container risks and best practices to identify vulnerabilities in images
Skills you'll gain
- Open Web Application Security Project (OWASP)
- Vulnerability Scanning
- Security Testing
- Computer Programming
- Technical Communication
- Continuous Monitoring
- Application Security
- Vulnerability Assessments
- Secure Coding
- DevSecOps
- CI/CD
- Vulnerability Management
- Docker (Software)
- Skills section collapsed. Showing 7 of 13 skills.
Details to know

Add to your LinkedIn profile
1 assignment
February 2026
See how employees at top companies are mastering in-demand skills

There are 3 modules in this course
This module introduces the fundamentals of Dynamic Application Security Testing (DAST) and shows how to integrate OWASP ZAP and Checkmarx DAST into a CI/CD workflow. Learners will deploy, configure, and automate baseline scans against a running web app, interpret basic results, and use those findings to drive early security conversations in development.
What's included
4 videos2 readings1 peer review
This module moves from simple scanning to analysis and precision. Learners will analyze ZAP results, differentiate between true and false positives, and tune alert filters for meaningful signal. They will then remediate vulnerabilities, re-scan to verify fixes, and document evidence of secure coding improvements.
What's included
3 videos1 reading1 peer review
The final module focuses on scaling and communicating application security insights. Learners will design automated reporting pipelines, evaluate vulnerability trends across builds, and create executive-ready summaries using ZAP reports and dashboard data. The emphasis is on converting raw findings into actionable intelligence and measurable business value.
What's included
4 videos1 reading1 assignment2 peer reviews
Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.








