Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure coding"
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Skills you'll gain: Django (Web Framework), Web Development, Web Servers, Web Applications, Data Modeling, Back-End Web Development, Maintainability, MySQL, Database Design, Application Security, Object-Relational Mapping, Application Frameworks, Database Management, HTML and CSS, Restful API, Debugging, Virtual Environment
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Real Time Data, Web Services, Encryption, Engineering Software, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Computer Programming, C (Programming Language), System Testing, System Design and Implementation
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Regulatory Requirements, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: Desktop Support, Hardware Troubleshooting, Operating Systems, Network Troubleshooting, Command-Line Interface, System Support, Computer Hardware, Network Security, Mobile Security, Microsoft Windows, General Networking, Unix Commands, Technical Support, Mac OS, Network Administration, Linux, System Configuration, Infrastructure Security, Computer Displays, Software Installation
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Cryptography, Wireless Networks
University of London
Skills you'll gain: Development Environment, Debugging, Program Development, Computer Programming Tools, Software Development Tools, Visualization (Computer Graphics), Computer Programming, Computer Graphics, Integrated Development Environments, Event-Driven Programming, Javascript, Object Oriented Programming (OOP)
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Searches related to secure coding
In summary, here are 10 of our most popular secure coding courses
- Cryptography :Â ISC2
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Django Web Framework :Â Meta
- Cryptography and Information Theory:Â University of Colorado System
- Development of Secure Embedded Systems:Â EIT Digital
- Privacy Law and Data Protection:Â University of Pennsylvania
- Introduction to Cybersecurity Essentials:Â IBM
- Preparation for CompTIA A+ Certification:Â IBM
- Advanced System Security Topics:Â University of Colorado System
- Introduction to Computer Programming :Â University of London