We may earn an affiliate commission when you visit our partners.

Security Engineer

Save

generative_async_error: 'str' object has no attribute 'get'

Read more

generative_async_error: 'str' object has no attribute 'get'

Share

Help others find this career page by sharing it with your friends and followers:

Salaries for Security Engineer

City
Median
New York
$142,000
San Francisco
$176,000
Seattle
$173,000
See all salaries
City
Median
New York
$142,000
San Francisco
$176,000
Seattle
$173,000
Austin
$137,000
Toronto
$101,000
London
£86,000
Paris
€61,000
Berlin
€111,000
Tel Aviv
₪61,000
Singapore
S$100,000
Beijing
¥295,000
Shanghai
¥103,000
Shenzhen
¥430,000
Bengalaru
₹1,545,000
Delhi
₹922,000
Bars indicate relevance. All salaries presented are estimates. Completion of this course does not guarantee or imply job placement or career outcomes.

Path to Security Engineer

Take the first step.
We've curated 24 courses to help you on your path to Security Engineer. Use these to develop your skills, build background knowledge, and put what you learn to practice.
Sorted from most relevant to least relevant:

Reading list

We haven't picked any books for this reading list yet.
Classic in the field of web application security. It provides a detailed overview of the most common web application vulnerabilities and how to exploit them. It must-read for anyone who wants to learn more about this topic.
Practical guide to software security, covering topics such as secure coding practices, threat modeling, and security testing. It valuable resource for anyone involved in the development of secure software.
Provides a practical, hands-on approach to implementing Spring Security, covering authentication, authorization, and securing APIs.
Provides a detailed overview of software security assessment, covering topics such as vulnerability identification, risk assessment, and penetration testing. It valuable resource for anyone involved in the security assessment of software.
Hands-on guide to penetration testing. It covers all aspects of the process, from planning and scoping to reporting and remediation. It is an excellent resource for anyone who wants to learn more about this topic.
Comprehensive guide to software security assessment. It covers all aspects of the process, from planning and scoping to reporting and remediation. It is an excellent resource for anyone who wants to learn more about this topic.
Practical guide to ethical hacking. It covers all aspects of the process, from reconnaissance to exploitation to reporting. It is an excellent resource for anyone who wants to learn more about this topic.
Provides a comprehensive overview of secure coding practices, covering topics such as input validation, memory management, and error handling. It valuable resource for anyone involved in the development of secure software.
Provides a comprehensive overview of cryptography, covering topics such as encryption, authentication, and digital signatures. It valuable resource for anyone involved in the design and implementation of secure systems.
Practical guide to vulnerability management. It covers all aspects of the process, from planning and scoping to reporting and remediation. It is an excellent resource for anyone who wants to learn more about this topic.
Beginner-friendly guide to web application security, covering topics such as SQL injection, cross-site scripting, and session hijacking. It valuable resource for anyone involved in the development of secure web applications.
Provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, cloud security controls, and cloud security monitoring. It valuable resource for anyone involved in the security of cloud computing environments.
Beginner's guide to web application security. It covers all aspects of the topic, from the basics of web application security to more advanced topics such as secure coding and penetration testing. It is an excellent resource for anyone who wants to learn more about this topic.
Provides a comprehensive overview of security in computing, covering topics such as security principles, security threats, and security controls. It valuable resource for anyone involved in the development of secure systems.
Provides a comprehensive overview of computer security, covering topics such as security principles, security threats, and security controls. It valuable resource for anyone involved in the development of secure systems.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser