Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure coding"

Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, Application Security, C++ (Programming Language)
Status: Free TrialSkills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Automation
Status: NewPackt
Skills you'll gain: Security Testing, Cybersecurity, Network Security, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols, Exploitation techniques, Scripting
Status: NewStatus: Free TrialSkills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Status: Free TrialInfosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms
Status: Free TrialSkills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
Status: NewStatus: Free TrialSkills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
Status: Free TrialJohns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
Status: NewStatus: Free TrialSkills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
Status: NewStatus: Free TrialSkills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Hardening, Identity and Access Management, Authorization (Computing), User Accounts, Security Controls, Patch Management, Authentications
Searches related to secure coding
In summary, here are 10 of our most popular secure coding courses
- Encryption and Decryption using C++:Â Coursera
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Python for Security:Â Packt
- Exploit Development, Malware, & Defensive Strategies:Â Packt
- Python for Cybersecurity:Â Infosec
- Introduction to Applied Cryptography:Â University of Colorado System
- Symmetric Cryptography:Â University of Colorado System
- Advanced Exploitation and Scripting Techniques:Â Packt
- Certified Ethical Hacker (CEH): Unit 8:Â Pearson
- Introduction to Penetration Testing and Ethical Hacking:Â Johns Hopkins University










