Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "application security"
New York Institute of Finance
Skills you'll gain: Credit Risk, Operational Risk, Risk Management, Risk Management Framework, Business Risk Management, Risk Modeling, Risk Mitigation, Financial Market, Enterprise Risk Management (ERM), Risk Appetite, Risk Control, Derivatives, Governance, Portfolio Management, Risk Analysis, Capital Markets, Investment Management, Financial Analysis, Market Data, Key Performance Indicators (KPIs)
- Status: Free
University of Manchester
Skills you'll gain: Process Engineering, Molecular Biology, Chemical Engineering, Life Sciences, Biochemistry, Bioinformatics, Biology, Pharmaceuticals, Environmental Engineering, Manufacturing Processes, Process Development, Microbiology
Microsoft
Skills you'll gain: Microsoft Excel, Excel Formulas, Data Visualization, Spreadsheet Software, Microsoft 365, Productivity Software, Data Import/Export, Data Management
Workday
Skills you'll gain: Workday (Software), Business Process, Workflow Management, Business Reporting, System Configuration, Role-Based Access Control (RBAC), Enterprise Security, Organizational Structure, Data Access, Multi-Tenant Cloud Environments
Google Cloud
Skills you'll gain: Kubernetes, Identity and Access Management, Cloud-Native Computing, Google Cloud Platform, CI/CD, Containerization, Application Deployment, Cloud Management, Scalability, Cloud Computing, Cloud Infrastructure, Load Balancing, Continuous Integration, Continuous Deployment, DevOps, Continuous Delivery, YAML, Data Storage, Cloud Applications, Cloud Security
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Java, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
Microsoft
Skills you'll gain: Microsoft Word, Microsoft 365, Productivity Software, Proofreading, Document Management, Technical Documentation, Microsoft Windows, Presentations, Writing, Editing, Data Entry, Data Visualization, Grammar
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, General Data Protection Regulation (GDPR), Regulatory Compliance, Law, Regulation, and Compliance, Compliance Reporting, Regulation and Legal Compliance, Legal Risk, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, Network Performance Management, Computer Networking, Network Model, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming
Searches related to application security
In summary, here are 10 of our most popular application security courses
- Risk Management: New York Institute of Finance
- Industrial Biotechnology: University of Manchester
- Work Smarter with Microsoft Excel: Microsoft
- Workday Basics Series: Workday
- Architecting with Google Kubernetes Engine: Google Cloud
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
- Database Essentials and Vulnerabilities: IBM
- Work Smarter with Microsoft Word: Microsoft
- Advanced System Security Design: University of Colorado System