Filter by
The language used throughout the course, in both instruction and assessments.
Results for "securing+applications"
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Software Design Documents, Databases, Technical Design, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Life Cycle, Security Engineering
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Software Testing, Web Applications, JavaScript Frameworks, Front-End Web Development
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
Skills you'll gain: Cloud-Native Computing, Cloud Applications, Cloud API, Google Cloud Platform, Application Programming Interface (API), Authentications, Serverless Computing, Identity and Access Management, API Design, Event-Driven Programming, Cloud Services, Restful API, Microservices, Node.JS, Authorization (Computing)
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Public Key Infrastructure, Wireless Networks, Extensible Languages and XML
Searches related to securing+applications
In summary, here are 10 of our most popular securing+applications courses
- Systems and Application Security: ISC2
- Secure Software Design: University of Colorado System
- Advanced System Security Design: University of Colorado System
- Web Technologies and Security: Codio
- Networking and Security in iOS Applications: University of California, Irvine
- Hands-On Labs in Google Cloud for Security Engineers: Google Cloud
- Cybersecurity and Privacy: Microsoft
- Secure Coding Practices: University of California, Davis
- Securing and Integrating Components of your Application 日本語版: Google Cloud
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft