Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Application Security Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, OSI Models, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Malware Protection, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, General Networking, Security Awareness, Intrusion Detection and Prevention, Command-Line Interface, Prompt Engineering, Large Language Modeling
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, OSI Models, Open Web Application Security Project (OWASP), TCP/IP, Network Security, General Networking, Cybersecurity, Prompt Engineering, Large Language Modeling, Vulnerability Assessments, Web Applications, Scripting, Generative AI, Python Programming, SQL, MySQL
- Status: New
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Threat Detection, Cybersecurity, File Systems, Data Security, Data Integrity, Data Analysis Software, Data Validation, Data Ethics, Data Storage Technologies, Microsoft Windows, Verification And Validation, Internet Of Things, Encryption, Network Monitoring, Real Time Data
- Status: New
Packt
Skills you'll gain: Cybersecurity, Microsoft Windows, Computer Security Awareness Training, Information Systems Security, Linux, Network Security, Linux Commands, Data Ethics, Data Security, Virtualization and Virtual Machines, Ethical Standards And Conduct, Hardening, Command-Line Interface, Virtual Machines, Operating Systems, Personally Identifiable Information, User Accounts, Computer Hardware, File Management
- Status: NewStatus: Free Trial
SkillUp EdTech
Skills you'll gain: Penetration Testing, Cybersecurity, Data Ethics, Information Systems Security, Cyber Security Policies, General Data Protection Regulation (GDPR), Vulnerability Management, Vulnerability Assessments, Information Privacy, Technical Writing
University of Manchester
Skills you'll gain: Process Engineering, Molecular Biology, Chemical Engineering, Life Sciences, Biochemistry, Bioinformatics, Biology, Pharmaceuticals, Environmental Engineering, Manufacturing Processes, Process Development, Microbiology
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Excel Macros, Peer Review, Visual Basic (Programming Language), Programming Principles, Data Import/Export, Microsoft Excel, Data Structures, Program Development, Computer Programming, Project Design, Simulations, Automation, Spreadsheet Software, Algorithms, UI Components, Debugging, Data Management, User Interface (UI), Data Cleansing, Data Validation
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Security Awareness, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, TCP/IP, Cybersecurity, Debugging
- Status: New
Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Threat Modeling, Cyber Risk, Cyber Security Assessment, Vulnerability Assessments, Compliance Management, ISO/IEC 27001, Return On Investment, NIST 800-53, Risk Management, Auditing, Stakeholder Engagement
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Microsoft Power Platform, Excel Formulas, Process Flow Diagrams, Business Process Modeling, User Story, Business Requirements, Stakeholder Management, Data Modeling, Microsoft Excel, Microsoft Visio, Software Development Life Cycle, Requirements Analysis, Requirements Elicitation, Quality Management, Pivot Tables And Charts, Power BI, Microsoft Power Automate/Flow, Scrum (Software Development), Business Analysis, Project Management
- Status: New
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Operational Risk, Stakeholder Communications, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments
Application Security learners also search
In summary, here are 10 of our most popular application security courses
- The Complete Ethical Hacking Course: Packt
- Advanced Web Exploits, Python Scripting & Network Attacks: Packt
- Cybersecurity Strategies for AI-Driven Organizations: Coursera Instructor Network
- Digital Forensics: Macquarie University
- CyberPatriot: Packt
- Introduction to Ethical Hacking Principles: SkillUp EdTech
- Industrial Biotechnology: University of Manchester
- Excel/VBA for Creative Problem Solving: University of Colorado Boulder
- Ciberseguridad de Google: Google
- Cyber Strategy, Planning & Compliance: Macquarie University