Software security courses can help you learn secure coding practices, vulnerability assessment, threat modeling, and incident response strategies. You can build skills in risk analysis, penetration testing, and implementing security protocols across various software environments. Many courses introduce tools like static and dynamic analysis software, intrusion detection systems, and security frameworks, showing how these tools enhance your ability to protect applications from potential threats.

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Resource Management, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Virtual Networking, Security Management, Cyber Security Assessment, System Configuration, Simulations, Configuration Management, Cybersecurity, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Cloud Security, Authentications, Single Sign-On (SSO), Google Cloud Platform, Threat Management, Security Controls, Authorization (Computing), Cloud Computing, Role-Based Access Control (RBAC), Threat Detection, Cloud Services, Data Security, Network Security, Firewall, Virtual Private Networks (VPN), User Accounts, Virtual Networking, Encryption, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Firewall, Network Monitoring, Google Cloud Platform, Network Troubleshooting, Intrusion Detection and Prevention, Identity and Access Management, Threat Detection, Proxy Servers
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud API, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Secure Coding, Cloud Deployment, Database Development, Maintainability, Server Side, Authentications
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Role-Based Access Control (RBAC), Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Standards
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Infrastructure As A Service (IaaS), Generative AI, Cloud Services, Containerization, Virtual Machines, Data Loss Prevention, Cloud Storage, Application Development, Security Management, Cloud Computing, Virtual Networking, Encryption, Malware Protection
Intermediate · Specialization · 3 - 6 Months