More to explore:

All Results

  • Skills you'll gain: Cloud Engineering, Load Balancing, Cloud Infrastructure, Cloud Computing Architecture, Virtual Networking, Security Management, Security Controls, Event Monitoring, Cloud Applications, Identity and Access Management, Key Management

  • Skills you'll gain: Amazon CloudWatch, Key Management, Amazon Elastic Compute Cloud, Amazon Web Services, Amazon S3, Infrastructure Security, Cloud Security, Security Controls, Cloud Infrastructure, AWS CloudFormation, Network Security, Cryptography, Network Infrastructure, Encryption, Virtual Networking, Cloud Storage, Network Monitoring, Event Monitoring, Incident Response, Incident Management

  • Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Networking, Security Controls, Cloud Security, Vulnerability Management, Endpoint Security, Network Planning And Design, Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing

  • Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Incident Management, Event Monitoring

  • Skills you'll gain: Key Management, Encryption, Amazon CloudWatch, Amazon Web Services, Cloud Security, Event Monitoring, Continuous Monitoring, Data Security, Security Controls, System Monitoring, Amazon S3

  • Skills you'll gain: Amazon CloudWatch, Serverless Computing, Amazon Web Services, Application Deployment, AWS CloudFormation, Cloud Management, Cloud Deployment, Cloud-Native Computing, Continuous Deployment, Application Performance Management, Cloud Applications, AWS Identity and Access Management (IAM), System Monitoring, Event Monitoring, IT General Controls (ITGC), Continuous Monitoring, Infrastructure as Code (IaC), Data Security, Disaster Recovery

What brings you to Coursera today?

  • Skills you'll gain: Amazon Web Services, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure Security, Cloud Security, Network Security, Application Security, Firewall, Amazon Elastic Compute Cloud, Endpoint Security, Data Security, Security Controls, Network Monitoring, Vulnerability Management, Threat Detection

  • Skills you'll gain: Computer Security Incident Management, IT Security Architecture, Incident Management, Cloud Infrastructure, Cloud Standards

  • Skills you'll gain: AWS CloudFormation, Amazon Web Services, Amazon CloudWatch, Amazon Elastic Compute Cloud, Infrastructure as Code (IaC), Cloud Management, Cloud Deployment, Cloud Computing Architecture, Cloud Standards, Cloud Security, Natural Language Processing, Key Management, Application Security, Anomaly Detection, Encryption, Vulnerability Assessments

  • Skills you'll gain: Infrastructure as Code (IaC), Containerization, CI/CD, AWS CloudFormation, Cloud Deployment, Amazon CloudWatch, Application Deployment, Serverless Computing, Cloud-Native Computing, Docker (Software), Amazon Web Services, Continuous Deployment, Kubernetes, API Gateway, Cloud Development, Continuous Integration, DevOps, Amazon DynamoDB, System Monitoring, Event Monitoring

  • Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Amazon Web Services, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, AI Security, Cloud Management, Key Management, Cryptography, Continuous Monitoring, Firewall, System Monitoring

  • Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, Event Monitoring, Amazon Web Services, Security Controls, Cloud Security, IT Security Architecture, Cryptography, Network Monitoring, Network Performance Management, Cyber Security Policies, Security Requirements Analysis, Governance