Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "codage sécurisé"
Status: Free TrialUniversity of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity
Status: Free TrialSkills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cloud-Native Computing, Software Architecture, Security Engineering, Software Design, Microsoft Azure, Cybersecurity, DevOps, Kubernetes, Infrastructure as Code (IaC), Web Applications, Azure DevOps, Containerization, API Design, Docker (Software), Software Engineering, Role-Based Access Control (RBAC), Dependency Analysis, Git (Version Control System)

Google Cloud
Skills you'll gain: Single Sign-On (SSO), Email Security, Google Workspace, Cloud Security, Security Management, Data Security, Security Controls, Application Security, Mobile Security, Cloud API, API Gateway, Authentications, Multi-Factor Authentication, Identity and Access Management, Enterprise Application Management, Threat Detection
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Status: NewStatus: Free TrialSkills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
Status: Free TrialSkills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
Status: PreviewSkills you'll gain: Threat Management, Microsoft Azure, Cloud Security, Threat Detection, Key Management, Cloud Management, Security Controls, Data Security, Security Information and Event Management (SIEM), Data Structures, Role-Based Access Control (RBAC), Continuous Monitoring, Firewall, Cryptography, Virtual Environment, Event Monitoring, Query Languages

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
Status: Free TrialSkills you'll gain: Generative AI, Google Cloud Platform, Cybersecurity, Cloud Security, Technical Communication
Status: PreviewCoursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Status: Free TrialSkills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management
In summary, here are 10 of our most popular codage sécurisé courses
- Secure Coding Practices: University of California, Davis
- Sound the Alarm: Detection and Response: Google
- Cyber Security: DevSecOps: Macquarie University
- Seguridad de Google Workspace: Google Cloud
- Cyber Security: Applied Cryptography: Macquarie University
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 3: Pearson
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Microsoft Defender for Cloud Certification: Microsoft
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Put It All Together: Prepare for a Cloud Security Analyst Job: Google Cloud










