Software security courses can help you learn secure coding practices, vulnerability assessment, threat modeling, and incident response strategies. You can build skills in risk analysis, penetration testing, and implementing security protocols across various software environments. Many courses introduce tools like static and dynamic analysis software, intrusion detection systems, and security frameworks, showing how these tools enhance your ability to protect applications from potential threats.

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Universidad Nacional Autónoma de México
Skills you'll gain: Musical Composition, Music, Open Source Technology, Media Production, Digital Publishing, Creativity, Content Creation
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Cyber Threat Intelligence, Encryption, Regulatory Compliance
Advanced · Course · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management
Intermediate · Course · 1 - 3 Months

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
Advanced · Course · 1 - 4 Weeks