Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "anwendungssicherheit"
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
- Status: New
Skills you'll gain: Google Gemini, Debugging, Unit Testing, Code Review, Integrated Development Environments, Software Development Tools, Software Documentation, Cloud Development, Application Development, Maintainability, Software Testing
- Status: NewStatus: Free Trial
Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
- Status: NewStatus: Free Trial
Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cyber Threat Intelligence, Cybersecurity, Data Loss Prevention, Threat Detection, Information Privacy, Event Monitoring, Incident Response, Automation
What brings you to Coursera today?
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
- Status: NewStatus: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation
- Status: Free Trial
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Application Security, Firewall, Hardening, Network Monitoring, Exploit development, Incident Response, Vulnerability Scanning, Security Controls, Virtualization, Encryption, Exploitation techniques, Solution Design, Internet Of Things, Cryptography, Web Servers, Network Analysis, SQL
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
In summary, here are 10 of our most popular anwendungssicherheit courses
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Anwendungsentwicklung mit Gemini Code Assist optimieren:Â Google Cloud
- Certified Ethical Hacker (CEH): Unit 7:Â Pearson
- Certified Ethical Hacker (CEH): Unit 5:Â Pearson
- Certified Ethical Hacker (CEH): Unit 1:Â Pearson
- Cybersecurity Prevention and Detection: Unit 2:Â Pearson
- Certified Ethical Hacker (CEH): Unit 3:Â Pearson
- Certified Ethical Hacker (CEH): Unit 2:Â Pearson
- Certified Ethical Hacker (CEH): Unit 4:Â Pearson
- Secure Coding: SSDLC, OWASP & SonarQube Essentials:Â Coursera Instructor Network