Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure coding"
University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Electronic Hardware, Electronic Systems, Embedded Systems, Systems Design, Application Specific Integrated Circuits, Integrated Development Environments, Electrical and Computer Engineering, System Design and Implementation, Computer Architecture, Software Development Tools, Hardware Architecture, Software Development, Simulation and Simulation Software, Development Environment, Verification And Validation, Debugging, Computer Engineering, Schematic Diagrams
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
Workday
Skills you'll gain: Workday (Software), Security Controls, Business Process, Workflow Management, Business Reporting, Human Resources Software, System Configuration, Role-Based Access Control (RBAC), Organizational Structure
- Status: Free
University of Toronto
Skills you'll gain: Data Structures, Object Oriented Programming (OOP), Unit Testing, Python Programming, Program Development, Algorithms, Software Testing, Debugging, Computational Thinking
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Meta
Skills you'll gain: Mobile Development, React.js, Web Applications, Event-Driven Programming, UI Components, Front-End Web Development, Dataflow, Cascading Style Sheets (CSS), Javascript, Development Environment, Hypertext Markup Language (HTML)
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Kubernetes, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Skills you'll gain: Stakeholder Communications, Incident Response, Stakeholder Engagement, Computer Security Incident Management, Data Ethics, Cybersecurity, Security Awareness, Incident Management, Data Security, Communication, Asset Protection, Ethical Standards And Conduct, Business Ethics, Interviewing Skills, Professional Networking
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, Data Import/Export, Algorithms, Automation, Computer Programming, File Management
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Application Frameworks, Web Development Tools, Software Architecture, Network Protocols, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Cloud Platforms, Microsoft Azure, Secure Coding, Software Development, Development Environment, FinTech
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Regulation and Legal Compliance, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls, Risk Analysis
Searches related to secure coding
In summary, here are 10 of our most popular secure coding courses
- FPGA Design for Embedded Systems:Â University of Colorado Boulder
- Programming for Everybody (Getting Started with Python):Â University of Michigan
- Workday Basics Series:Â Workday
- Learn to Program: Crafting Quality Code:Â University of Toronto
- IT Fundamentals for Cybersecurity:Â IBM
- React Basics:Â Meta
- Assets, Threats, and Vulnerabilities:Â Google
- IBM DevOps and Software Engineering:Â IBM
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- Automate Cybersecurity Tasks with Python:Â Google