Filter by
The language used throughout the course, in both instruction and assessments.
Choose the Cloud Computing Security Course That Aligns Best With Your Educational Goals
University of Colorado System
Skills you'll gain: Amazon Web Services, Cloud Computing, Cloud Infrastructure, Computer Networking, Cloud Applications, Cloud Management, Network Security, Security Engineering
Skills you'll gain: Security Engineering, System Security, Network Security, Software Security, Computer Security Incident Management, Leadership and Management, Security Software, Risk Management, Strategy and Operations, Algorithms, Cloud Computing, Cryptography, Cyberattacks, Operations Management, Security Strategy, Human Factors (Security), Software-Defined Networking, Cloud Applications, Process Analysis, Communication, Financial Accounting
LearnQuest
Skills you'll gain: Cloud Computing, Cloud Management, Computer Security Incident Management, Cyberattacks, Network Security
Skills you'll gain: Cloud Computing, Google Cloud Platform, Cloud Platforms, Computer Architecture, Cloud Engineering, Cloud Applications, Cloud Storage, Computer Programming Tools, Data Analysis, Kubernetes, Web Development, Google App Engine
Skills you'll gain: Cloud Computing, Cloud Platforms
Microsoft
Skills you'll gain: Cloud Computing, Computer Architecture, Data Management, Leadership and Management, Microsoft Azure, Network Security, Operating Systems, System Security
Skills you'll gain: Cloud Computing
Google Cloud
Skills you'll gain: Cloud Computing
Skills you'll gain: Cloud Computing
Google Cloud
Google Cloud
Skills you'll gain: Data Analysis
Skills you'll gain: Google Cloud Platform
In summary, here are 10 of our most popular cloud computing security courses
- Cloud Computing Security:Â University of Colorado System
- (ISC)² Systems Security Certified Practitioner (SSCP): ISC2
- Advanced Network Security:Â LearnQuest
- Preparing for Your Associate Cloud Engineer Journey:Â Google Cloud
- Introduction to Cybersecurity Foundations:Â Infosec
- Microsoft Cybersecurity Analyst:Â Microsoft
- Adding Decentralized Notifications to an Application using Push Protocol:Â Google Cloud
- Hardening Default GKE Cluster Configurations:Â Google Cloud
- How to Use a Network Policy on Google Kubernetes Engine:Â Google Cloud
- Managing Threat Intelligence with Cortex XSOAR:Â Google Cloud