Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Software Security Course Catalog
- Status: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
- Status: Preview
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Responsible AI, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Encryption
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
- Status: Free Trial
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Software Development Methodologies, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Design Documents, System Requirements, Software Development Life Cycle, Verification And Validation, Technical Communication
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Responsible AI, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Cyber Security Assessment, Security Controls, Security Engineering, Threat Modeling, DevSecOps, Artificial Intelligence, Cyber Governance, Data Security, Artificial Intelligence and Machine Learning (AI/ML), Encryption, Risk Management, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Applied Machine Learning, Governance
- Status: Free Trial
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
- Status: Free Trial
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Web Applications, Javascript, Web Development, Node.JS, Web Servers, Hypertext Markup Language (HTML), Java Programming
- Status: Free Trial
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Threat Detection, Containerization, File Management, Incident Response
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Software Security learners also search
In summary, here are 10 of our most popular software security courses
- System Hacking, Malware Threats, and Network Attacks: Packt
- Personnel & Third-Party Security: University of California, Irvine
- Introduction to IT Security: Akamai Technologies, Inc.
- Security for Artificial Intelligence Software and Services: Board Infinity
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- Requirements Gathering for Secure Software Development: University of Colorado System
- Cyber Security: Security of AI: Macquarie University
- Cryptography, Network Security, and Application Security: Packt
- JavaScript Security Part 1: Infosec
- Linux for Security Experts: Codio