Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure coding"
- Status: NewStatus: Free Trial
Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
- Status: NewStatus: Free Trial
Skills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Hardening, Identity and Access Management, Authorization (Computing), User Accounts, Security Controls, Patch Management, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Digital Communications, Authentications, Data Integrity, Algorithms, Computer Science
- Status: Free Trial
Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, Network Security, System Monitoring, Network Protocols
- Status: Preview
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Searches related to secure coding
In summary, here are 6 of our most popular secure coding courses
- Certified Ethical Hacker (CEH): Unit 6:Â Pearson
- Certified Kubernetes Security Specialist (CKS): Unit 3:Â Pearson
- Introduction to Penetration Testing and Ethical Hacking:Â Johns Hopkins University
- Cryptography:Â University of Maryland, College Park
- Establishing Command-and-Control and Finding Credentials:Â Infosec
- Introduction to Applied Cryptography:Â University of London