Cloud security courses can help you learn about risk management, data protection strategies, compliance frameworks, and identity and access management. You can build skills in threat detection, incident response, and implementing security protocols across various cloud environments. Many courses introduce tools such as AWS Security Hub, Azure Security Center, and Google Cloud Security Command Center, showing how these tools support the skills you develop in safeguarding cloud infrastructure and ensuring data integrity.

Northeastern University
Skills you'll gain: Transfer Learning, Small Data, Deep Learning, Applied Machine Learning, Machine Learning Methods, Model Training, Unsupervised Learning, Machine Learning, Data Synthesis, Supervised Learning
Mixed · Course · 1 - 3 Months

University of Cape Town
Skills you'll gain: Business Modeling, Peer Review, FinTech, Presentations, Sales Presentations, Ideation, Entrepreneurship, Business Planning, Financial Inclusion, Business Strategies, Financial Regulation, Financial Regulations, Business Analysis, Oral Expression, New Business Development, Constructive Feedback, Financial Services, New Product Development, Regulatory Requirements, Regulatory Compliance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Serverless Computing, API Gateway, Cloud-Based Integration, Extensible Markup Language (XML), JSON, Amazon Web Services, Cloud Deployment, Cloud Development, Extensible Languages and XML, Application Programming Interface (API), Application Deployment, Cloud Applications, Data Processing, Data Transformation, API Testing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: OpenAI API, Embeddings, Dimensionality Reduction, AI Integrations, OpenAI, Text Mining, Generative AI, Python Programming, Data Analysis, Program Development, Data Manipulation
Intermediate · Guided Project · Less Than 2 Hours

AI CERTs
Skills you'll gain: Blockchain, Scripting, Cryptography, Cryptographic Protocols, Transaction Processing, Encryption, Application Security, Payment Systems, Program Development, Application Development, FinTech, Programming Principles, Digital Assets, Scalability, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: DevOps, CI/CD, Continuous Integration, Continuous Deployment, Continuous Delivery, Git (Version Control System), Version Control, Software Development, Cloud-Native Computing, Software Development Methodologies, Application Deployment, Kubernetes, Infrastructure as Code (IaC)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Unix Commands, Unix, Unix Shell, File I/O, User Accounts, Operating System Administration, Command-Line Interface, Operating Systems, User Provisioning, File Systems, Systems Administration, File Management, System Support, System Configuration
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Encryption, Amazon Web Services, Cryptographic Protocols, Telecommunications, Data Sharing, Collaborative Software
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Application Lifecycle Management, Azure DevOps Pipelines, DevSecOps, Azure DevOps, DevOps, Continuous Delivery, Devops Tools, Software Quality Assurance, Release Management, Software Quality (SQA/SQC), CI/CD, Git (Version Control System), Verification And Validation, Continuous Integration, GitHub, Software Testing, Security Controls, Collaborative Software, Development Environment, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Scalability, Devops Tools, IT Automation, IT Infrastructure, Cloud Computing, Systems Administration, Servers
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Stored Procedure, Disaster Recovery, Data Maintenance, Database Management, Database Architecture and Administration, Oracle Databases, Data Migration, Key Management, Data Integrity, Encryption, Data Loss Prevention, Data Security
Advanced · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Digital Forensics, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Incident Management, Endpoint Security, Cyber Security Strategy, Cyber Attacks, Cybersecurity, Cyber Security Policies, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months