Cloud security courses can help you learn about risk management, data protection strategies, compliance frameworks, and identity and access management. You can build skills in threat detection, incident response, and implementing security protocols across various cloud environments. Many courses introduce tools such as AWS Security Hub, Azure Security Center, and Google Cloud Security Command Center, showing how these tools support the skills you develop in safeguarding cloud infrastructure and ensuring data integrity.

Google Cloud
Skills you'll gain: Cloud Storage, Google Cloud Platform, Data Management, Unix Shell
Beginner · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Kubernetes, Application Deployment, Google Cloud Platform, Network Troubleshooting, Cloud Applications, Event Monitoring, Command-Line Interface, Terraform, Cloud Storage
Beginner · Project · Less Than 2 Hours

Alibaba Cloud Academy
Skills you'll gain: Docker (Software), Containerization, Kubernetes, Terraform, Prometheus (Software), Application Deployment, DevOps, Performance Testing, Application Performance Management, Cloud Services, System Monitoring, Event Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Cloud Management, Puppet (Configuration Management Tool), Infrastructure As A Service (IaaS), Cloud Services, Cloud Computing, Cloud Infrastructure, Virtual Machines, Software As A Service, Change Control, Terraform, System Monitoring, Incident Management, Configuration Management, Release Management, Cloud Storage, Disaster Recovery, Automation, Scalability, Service Level
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Network Troubleshooting, Kubernetes, Google Cloud Platform, Application Performance Management, Event Monitoring, Query Languages, Analytics, Performance Tuning
Beginner · Project · Less Than 2 Hours

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control
Beginner · Specialization · 3 - 6 Months

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud Infrastructure, YAML, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Data Storage, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Docker (Software), Microservices, Authentications, OAuth, Integration Testing, Event-Driven Programming, Secure Coding, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration, Authorization (Computing), Transaction Processing
Intermediate · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Public Cloud, Cloud Computing Architecture, Cloud Computing, Application Programming Interface (API), Cloud Services, Scalability, Cloud Platforms, Amazon Web Services, Infrastructure As A Service (IaaS), Technical Services, Systems Administration, Solution Architecture, Security Engineering
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months