Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security+software"
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Security Strategy, Cyber Security Assessment, Security Controls, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
Infosec
Skills you'll gain: Secure Coding, Computer Programming Tools, Application Security, System Programming, C++ (Programming Language), C (Programming Language), Software Development Tools, Code Review, Debugging, Interoperability, Unix, Embedded Systems, Cryptography, Programming Principles, Security Engineering, Vulnerability Assessments, Operating Systems, Data Security, Linux
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cloud Platforms, Network Security, Private Cloud, Threat Detection, Public Cloud, Firewall, Security Management
Microsoft
Skills you'll gain: Azure Active Directory, Microsoft Azure, Active Directory, Web Applications, Cloud Applications, Application Security, Identity and Access Management, Cloud Security, Authorization (Computing), Key Management, Data Security, Authentications, Encryption
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, User Accounts, Group Policy, Security Controls, Active Directory, Identity and Access Management, Software Installation, Servers, Encryption, Network Planning And Design, Network Performance Management
Skills you'll gain: Virtualization, Augmented and Virtual Reality (AR/VR), Virtual Machines, Virtual Private Networks (VPN), Network Administration, Network Security, Network Architecture, Infrastructure Security, Network Infrastructure, Mobile Security, General Networking, Cloud Computing, Hardware Troubleshooting, Computer Networking, Local Area Networks, Wireless Networks, Cloud Security, Internet Of Things, Computer Hardware, Peripheral Devices
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Storyboarding, Functional Requirement, Goal Setting, Software Documentation, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements, Meeting Facilitation, Prototyping, Software Development Life Cycle, Technical Documentation
In summary, here are 10 of our most popular security+software courses
- Digital Safety and Security:Â Arizona State University
- Writing Secure Code in C++:Â Infosec
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Secure Your Applications:Â Microsoft
- Software Security for Web Applications:Â Codio
- Introduction to Computer Security:Â University of London
- Advanced System Security Topics:Â University of Colorado System
- Windows Server Management and Security:Â University of Colorado System
- Advanced Networking, Virtualization, and IT Security:Â Packt
- Secure Software Design:Â University of Colorado System