Cloud Computing Security courses can help you learn about risk assessment, data protection strategies, compliance frameworks, and incident response planning. You can build skills in threat modeling, vulnerability management, and implementing security controls across cloud environments. Many courses introduce tools like AWS Identity and Access Management, Azure Security Center, and various encryption technologies, showing how these skills are applied to safeguard data and maintain compliance in cloud infrastructures.

EC-Council
Skills you'll gain: Digital Forensics, Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
Beginner · Professional Certificate · 3 - 6 Months
Georgia Institute of Technology
Skills you'll gain: Cloud Applications, Cloud Computing, Cloud Infrastructure, Distributed Computing, Virtualization, Data Store, Software Systems, Multi-Tenant Cloud Environments, Virtual Machines, Scalability, Apache Hadoop
Mixed · Course · 1 - 3 Months

Fortinet, Inc.
Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Lightweight Directory Access Protocols, Network Administration, Security Information and Event Management (SIEM), Security Engineering, Network Performance Management, Enterprise Security, Application Security, Network Infrastructure, Cybersecurity, Computer Security, Cyber Security Strategy
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Data Security, Cyber Risk, Cybersecurity, Data Sharing, Cyber Attacks, Security Management, Cryptography, Security Software, Security Strategy, Network Security, Risk Modeling, Data Access, Statistical Methods
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Data Security, Cyber Threat Hunting, Email Security, Authentications, Security Management, Security Strategy
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Risk, Security Awareness, Human Factors (Security), Cyber Attacks, Mobile Security, Cyber Governance, Cyber Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Security Assessment, Usability, Data Security, Cyber Threat Hunting, Cyber Operations, Organizational Leadership, Strategic Leadership, Team Leadership, Leadership and Management, Leadership, Leadership Development
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Authentications, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Node.JS, Browser Compatibility
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Mobile Security, System Monitoring, Network Monitoring, Security Controls, Internet Of Things, Wireless Networks, Application Security, Information Systems Security, Continuous Monitoring, Authorization (Computing), Cybersecurity, Identity and Access Management, Cyber Attacks, General Networking, Authentications, Cloud Security, TCP/IP, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks