Application Security

Software Security is a crucial aspect of the technology industry, focused on protecting systems, networks, and data from digital attacks. Coursera's Software Security catalogue teaches you about the principles and techniques used to identify and prevent vulnerabilities in software systems. You'll learn about secure coding practices, threat modeling, principles of cryptography, security testing, and incident response. You'll also develop an understanding of how to design and implement secure software systems, and how to maintain security in a continuously evolving digital landscape. This skill is vital for roles such as software engineer, system analyst, network administrator, and cybersecurity specialist.
66credentials
3online degrees
275courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn career credentials while taking courses that count towards your Master’s degree.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Explore the Application Security Course Catalog

  • Status: New

    Skills you'll gain: Role-Based Access Control (RBAC), Postman API Platform, Authentications, Authorization (Computing), Restful API, Java Programming, Spring Boot, User Accounts, Application Programming Interface (API), Application Security, Back-End Web Development, Web Applications

  • Status: Free Trial

    Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Angular, OAuth, Test Driven Development (TDD), Cryptography, Data Validation, Unit Testing, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming

  • Status: New
    Status: Free Trial

    Skills you'll gain: API Gateway, Authentications, Application Programming Interface (API), OAuth, API Design, Cloud API, Open Web Application Security Project (OWASP), Authorization (Computing), Restful API, Threat Modeling, Application Security, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Encryption, Security Controls, Prometheus (Software), Flask (Web Framework), Grafana, Python Programming

  • Status: Free Trial

    University of Minnesota

    Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Distributed Denial-Of-Service (DDoS) Attacks, Web Services

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Secure Coding, Application Security, Blockchain, Scripting, Vulnerability Assessments, Scalability, Application Design, Payment Systems, Transaction Processing, Cryptography, FinTech, Emerging Technologies

  • Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL

  • Status: Free Trial

    Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Cryptographic Protocols, Computer Security, Security Testing, Security Engineering, Network Security, Data Security, Infrastructure Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Secure Coding, Network Protocols, Key Management, Encryption

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture

  • Status: Preview

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing