Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Application Security Course Catalog
Skills you'll gain: Data Ethics, Data Analysis, Data Literacy, Data Security, Google Sheets, Data Cleansing, Databases, Data Access, Data Quality, Data Management, Data Collection, Relational Databases, SQL, Metadata Management, Unstructured Data
Skills you'll gain: Threat Management, Cybersecurity, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, PHP (Scripting Language), Relational Databases, JSON, jQuery, Hypertext Markup Language (HTML), Javascript and jQuery, Ajax, Databases, Data Modeling, Database Application, Database Development, Debugging, Web Applications, Object Oriented Programming (OOP), Web Development, Authentications, Web Development Tools
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls
Skills you'll gain: User Story, Cloud Computing Architecture, Agile Software Development, Cloud Services, Agile Methodology, Kanban Principles, DevOps, Backlogs, Cloud Security, Cloud Infrastructure, Sprint Retrospectives, Cloud Platforms, Agile Project Management, Cloud Computing, Cloud-Native Computing, Cloud Storage, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
- Status: Free
Rice University
Skills you'll gain: Chemistry, General Science and Research, Physics, Laboratory Research, Scientific Methods, Experimentation
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Cloud Security, Cloud Infrastructure, Cloud Applications, Cloud Platforms, Network Protocols, Encryption, Cyber Attacks, Technical Support, Cloud Storage, Computer Hardware, General Networking, Information Technology, Cloud Computing, Databases
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Corporate Finance, Predictive Analytics, Spreadsheet Software, Google Sheets, Microsoft Excel
Application Security learners also search
In summary, here are 10 of our most popular application security courses
- Prepare Data for Exploration: Google
- Play It Safe: Manage Security Risks: Google
- Web Applications for Everybody: University of Michigan
- Security Analyst Fundamentals: IBM
- Introduction to Cyber Security: New York University
- DevOps, Cloud, and Agile Foundations: IBM
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Network Security: ISC2
- General Chemistry: Concept Development and Application: Rice University