Cloud Computing Security courses can help you learn about risk assessment, data protection strategies, compliance frameworks, and incident response planning. You can build skills in threat modeling, vulnerability management, and implementing security controls across cloud environments. Many courses introduce tools like AWS Identity and Access Management, Azure Security Center, and various encryption technologies, showing how these skills are applied to safeguard data and maintain compliance in cloud infrastructures.

AI CERTs
Skills you'll gain: Vulnerability Management, Encryption
Advanced · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Cloud Deployment, Google Gemini, Google Cloud Platform, AI Security, Generative AI, Cloud Security, System Configuration, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, General Networking, Cybersecurity, IBM Cloud, Cloud Platforms, Cryptography, Automation, Emerging Technologies, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Anomaly Detection, AI Security, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: AI Security, Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Anomaly Detection, Threat Modeling, Vulnerability Assessments, Cyber Security Strategy, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response
Intermediate · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, AI Security, Cloud Deployment, Google Cloud Platform, Cloud Security, Generative AI, Security Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks