Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "codage sécurisé"
Status: NewStatus: PreviewStarweaver
Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies
Status: Free TrialGoogle
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Cyber Attacks, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Linux, Debugging, Cybersecurity, SQL
Status: NewStatus: Free TrialSkills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Status: NewStatus: PreviewSkills you'll gain: Cyber Governance, ISO/IEC 27001, Continuous Monitoring, NIST 800-53, Compliance Management, Cyber Risk, Cyber Security Policies, Incident Response, Cloud Security, Cybersecurity, Data Governance, Event Monitoring, Cloud Management, Security Controls, Risk Management Framework, IT Management, Information Privacy, Security Awareness
Status: NewSkills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, Vulnerability Assessments, DevOps, GitHub, Automation
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Status: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting
Status: Free TrialGoogle
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Linux Commands, Computer Security Incident Management, Bash (Scripting Language), Event Monitoring, Network Architecture, Security Controls, Cybersecurity, Debugging, Linux, SQL
Status: Free TrialSkills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
Status: PreviewGoogle Cloud
Skills you'll gain: Google Gemini, SQL, Generative AI, Google Cloud Platform, Big Data, Customer Relationship Management, Jupyter, Artificial Intelligence and Machine Learning (AI/ML), Python Programming
Status: Free TrialSkills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
In summary, here are 10 of our most popular codage sécurisé courses
- AI Agents for Cybersecurity : Starweaver
- Cybersécurité Google: Google
- Ethical Hacking with Metasploit, SQL & Crypto: EDUCBA
- Cybersecurity Governance: 16 Steps with NIST & ISO: Starweaver
- CCST Cybersecurity Video Training Series: Packt
- JFrog DevOps: Secure Software Pipelines & CI/CD Mastery: Coursera Instructor Network
- Security Essentials for Modern Developers: Coursera Instructor Network
- CompTIA PenTest+ (PT0-002): Packt
- Ciberseguridad de Google: Google
- Tools for Security Specialists: Codio










