All Results
Status: Free TrialMacquarie University
Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Controls, CI/CD, Cybersecurity, Cyber Security Strategy, Cloud Security, Infrastructure as Code (IaC), Cloud Platforms, Vulnerability Management, Development Environment, Cloud Computing, Cloud Infrastructure, Cloud Computing Architecture, User Story, Backlogs
Status: NewStatus: PreviewStarweaver
Skills you'll gain: Terraform, AI Security, DevSecOps, Infrastructure as Code (IaC), Amazon Web Services, AWS CloudFormation, Amazon Elastic Compute Cloud, Cloud Security, Cloud Deployment, Firewall, Cloud Infrastructure, LLM Application, Application Deployment, Cloud Computing Architecture, Flask (Web Framework), Load Balancing, Analysis
Status: PreviewJohns Hopkins University
Skills you'll gain: DevOps, DevSecOps, Process Optimization, Devops Tools, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Software Development Tools, Continuous Delivery, Version Control, Git (Version Control System), Process Improvement, Web Development Tools, Software Development, IT Automation, Digital Transformation, Organizational Development, Cross-Functional Team Leadership, Business Transformation

Skills you'll gain: Azure DevOps, Azure DevOps Pipelines, Continuous Delivery, CI/CD, DevOps, Devops Tools, Test Planning, Continuous Integration, Software Development Methodologies, Git (Version Control System), Agile Software Development, YAML, Continuous Deployment, GitHub, Agile Methodology, Microsoft Development Tools, Test Automation, Version Control, Agile Project Management, Application Deployment
Status: PreviewBoard Infinity
Skills you'll gain: DevSecOps, DevOps, Application Security, Secure Coding, Security Testing, Continuous Delivery, CI/CD, Continuous Integration, Containerization, Security Software, Automation

Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Payment Card Industry (PCI) Data Security Standards, Regulatory Compliance, Devops Tools, Penetration Testing, Law, Regulation, and Compliance, Regulatory Requirements, Compliance Auditing
What brings you to Coursera today?
Status: Free TrialSkills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security

Skills you'll gain: Azure DevOps Pipelines, Azure DevOps, Continuous Delivery, CI/CD, Continuous Integration, Build Tools, Application Deployment, Version Control
Status: Free TrialMicrosoft
Skills you'll gain: CI/CD, Azure DevOps, Continuous Integration, Cloud Deployment, Application Deployment, Microsoft Azure, Azure DevOps Pipelines, Cloud Services, Continuous Deployment, DevOps, Cloud Applications, Cloud Security, Microsoft Development Tools, Application Performance Management, Microsoft Copilot, Cloud Management, Capacity Management, System Monitoring, Debugging

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Security Testing, Vulnerability Assessments, Application Security, DevSecOps, Cloud Security, Google Cloud Platform
Status: NewStatus: PreviewSkills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Status: Free TrialSkills you'll gain: AI Security, Large Language Modeling, LLM Application, Cybersecurity, Prompt Engineering, Threat Modeling, Cyber Security Assessment, Application Security, Vulnerability Assessments, Security Testing, Network Security, Exploitation techniques