Software security courses can help you learn secure coding practices, vulnerability assessment, threat modeling, and incident response strategies. You can build skills in risk analysis, penetration testing, and implementing security protocols across various software environments. Many courses introduce tools like static and dynamic analysis software, intrusion detection systems, and security frameworks, showing how these tools enhance your ability to protect applications from potential threats.

Skills you'll gain: Cybersecurity, Security Controls, Information Systems Security Assessment Framework (ISSAF), Computer Security, Security Strategy, Cyber Risk, Security Information and Event Management (SIEM), Data Ethics, Network Analysis, Personally Identifiable Information, Ethical Standards And Conduct
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Attacks, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Standards, Cloud Storage, Google Cloud Platform, Cybersecurity
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Deployment, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Containerization, Cloud Computing Architecture, Virtual Networking, Network Architecture, Role-Based Access Control (RBAC), Network Security, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Deployment, Cloud Computing Architecture, Cloud Computing, Cloud Services, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Security Controls, Secure Coding, Public Cloud, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Pontificia Universidad Católica del Perú
Skills you'll gain: User Story, User Experience Design, Usability, Functional Requirement, System Requirements, User Experience, Requirements Analysis, Persona (User Experience), User Research
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Public Key Cryptography Standards (PKCS), Distributed Denial-Of-Service (DDoS) Attacks, Cyber Risk
Beginner · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Network Security, Threat Modeling, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Authorization (Computing), Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Health Information Management, Regulatory Compliance, Data Management, Health Care, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Security, Telehealth, Security Management, Information Privacy, Electronic Medical Record, Threat Management, Emerging Technologies, Information Technology, Interoperability
Beginner · Course · 1 - 4 Weeks