Search result for Software security Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
This course we will explore the foundations of software security. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. LOW-LEVEL SECURITY WEB SECURITY Security for the Web: Introduction SECURE SOFTWARE DEVELOPMENT Security Requirements...
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
The design step in developing software has some unique characteristics. Secure software design is good software design. Secure software design is good software design Building Security in Security as a build-on, not an add-on Active vs Passive security Active vs Passive security Simple software compromises Software Life Cycle and Management considerations...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Describe the processes for operating endpoint device security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
lesson 1 Foundations Security mindset Essential concepts (policy CIA etc. ) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Engineering Maintainable Android Apps
by Dr. Douglas C. Schmidt , Michael Walker , Dr. Jules White- 4.5
Approx. 9 hours to complete
These lessons will demonstrate the benefits of good software engineering practices that are targeted at creating maintainable code for mobile apps. Software Engineering & Testing I Software Engineering as Search Software Engineering & Testing II Security & Sustainability I Security & Sustainability Security I Quiz Security & Sustainability II Security Vulnerability Walkthrough...
Understanding, Using, and Securing Crypto and Digital Assets
by AICPA- 4.8
Approx. 3 hours to complete
Crypto asset security overview Software and hardware wallets Security Security question debrief...
Related searches
Cyber Threats and Attack Vectors
by Greg Williams- 4.7
Approx. 12 hours to complete
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY Cloud Security Database Security Cloud Security Alliance Week 3: Cloud Security...
Software Design as an Element of the Software Development Lifecycle
by Albert Glock- 4.6
Approx. 11 hours to complete
This course talks about software development lifecycles a description/prescription for how we write software. Introduction to Software Design Introduction to Secure Software Design How Design fits into the flow of software development How High-Level Design (or Architecture) handles Security Problems How High-Level Design (or Architecture) handles Security Problems...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. ● how to help others to grasp security concepts and protect themselves. Understanding Security Threats Wireless Security Software Patch Management Creating a Company Culture for Security Security Goals Third-Party Security Security Training Mobile Security and Privacy Interview Role Play: Security...