Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Application Security Course Catalog
Skills you'll gain: React Native, Android Studio, Restful API, Version Control, UI/UX Research, Usability Testing, Git (Version Control System), Data Structures, Jest (JavaScript Testing Framework), Unix Commands, Android Jetpack, Android Development, Persona (User Experience), GitHub, Interaction Design, Kotlin, User Experience Design, User Interface and User Experience (UI/UX) Design, User Interface (UI), Mobile Development
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, Network Administration, IT Infrastructure, TCP/IP, Information Systems Security, File Systems, Microsoft Windows, Desktop Support, Network Protocols, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Computer Hardware, Technical Support, Software Installation
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
- Status: Free
University of Pennsylvania
Skills you'll gain: English Language, Vocabulary, Business Writing, Interviewing Skills, Verbal Communication Skills, Business Correspondence, Social Skills, Professional Networking, Professional Development, Business Communication
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Configuration Management, Cybersecurity, Security Management, Cyber Attacks, Computer Security Awareness Training, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Threat Detection, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Microsoft 365, Artificial Intelligence
Application Security learners also search
In summary, here are 10 of our most popular application security courses
- Meta Android Developer: Meta
- Computer Networks and Network Security: IBM
- Google IT Support: Google
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Security Analyst Fundamentals: IBM
- IT Fundamentals for Cybersecurity: IBM
- English for Career Development: University of Pennsylvania
- Sound the Alarm: Detection and Response: Google
- Assets, Threats, and Vulnerabilities: Google
- Certified in Cybersecurity: ISC2