• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Security Software


Results for "security+software"


  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    31 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    Security-Driven Software Development

    Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data & Identity Security

    Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness

    4.3
    Rating, 4.3 out of 5 stars
    ·
    8 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Secure Software Design

    Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Data Flow Diagrams (DFDs), Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Development Life Cycle, Technical Design

    4.6
    Rating, 4.6 out of 5 stars
    ·
    438 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    iOS Access Control & Protecting Software & System Integrity

    Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Authentications, Unit Testing, Application Security, Security Testing, Authorization (Computing), Secure Coding, Identity and Access Management, Debugging, Multi-Factor Authentication

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    The Embedded Linux Security Handbook

    Skills you'll gain: Embedded Software, Security Engineering, Application Security, Hardening, Embedded Systems, Infrastructure Security, Information Systems Security, Security Controls, Network Security, Secure Coding, Threat Modeling, Cybersecurity, Encryption, System Configuration, Security Strategy, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Computer Hardware

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Linux Security Basics and Beyond

    Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, Linux Servers, OS Process Management, Linux, Authentications, Zero Trust Network Access, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Information Systems Security, IT Security Architecture

    4.5
    Rating, 4.5 out of 5 stars
    ·
    6 reviews

    Intermediate · Specialization · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Requirements Engineering: Secure Software Specifications

    Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Data Flow Diagrams (DFDs), Storyboarding, Requirements Management, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Diagram Design, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements

    4.5
    Rating, 4.5 out of 5 stars
    ·
    856 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free
    Free
    I

    Infosec

    CompTIA Security+ 701

    Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Risk Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    588 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Tools of the Trade: Linux and SQL

    Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, File Management, Unix Shell, Database Application, Query Languages, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts

    4.8
    Rating, 4.8 out of 5 stars
    ·
    6.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Testing, Security Controls, Cyber Security Strategy, Cybersecurity, Infrastructure as Code (IaC), Vulnerability Management

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Access Control, Software Protection, System Integrity

    Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption

    Mixed · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular security+software courses

  • Systems and Application Security: ISC2
  • Security-Driven Software Development: Packt
  • Cyber Security: Data & Identity Security: Macquarie University
  • Secure Software Design: University of Colorado System
  • iOS Access Control & Protecting Software & System Integrity: Infosec
  • The Embedded Linux Security Handbook: Packt
  • Linux Security Basics and Beyond: Pearson
  • Requirements Engineering: Secure Software Specifications: University of Colorado System
  • CompTIA Security+ 701: Infosec
  • Tools of the Trade: Linux and SQL: Google

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok