Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cloud Security Course Catalog
University of Colorado Boulder
Skills you'll gain: Systems Engineering, Model Based Systems Engineering, Test Engineering, Engineering Practices, Product Lifecycle Management, Engineering Management, Risk Management Framework, Systems Integration, System Requirements, Verification And Validation, Requirements Analysis
Skills you'll gain: Desktop Support, Operating Systems, Command-Line Interface, System Support, Mobile Security, Network Security, Microsoft Windows, Unix Commands, Technical Support, Mac OS, Linux, Network Troubleshooting, System Configuration, Network Administration, Software Installation, Firewall, Encryption, Malware Protection
Technical University of Munich (TUM)
Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Aerospace Basic Quality System Standards, Manufacturing Processes, Manufacturing and Production, Big Data, Production Process, Cybersecurity, Artificial Intelligence, Threat Detection, Automation, Telecommunications, Data Processing, Cloud Services, Technology Strategies, Data Storage, Data Collection
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Personal Development, Self-Awareness, De-escalation Techniques, Stress Management, Health Technology
Google Cloud
Skills you'll gain: Gmail, Google Workspace, Generative AI, AI Personalization
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance
University of Cape Town
Skills you'll gain: Financial Regulations, FinTech, Financial Regulation, Blockchain, Banking, Financial Services, Consumer Lending, Financial Market, Emerging Technologies, Loans, Regulatory Compliance, Payment Systems, International Finance, Payment Processing, Risk Modeling
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
Coursera Project Network
Skills you'll gain: Scikit Learn (Machine Learning Library), Tensorflow, Cloud Computing, Classification And Regression Tree (CART), Supervised Learning, Applied Machine Learning, Machine Learning Methods, Pandas (Python Package), Data Visualization, Data Processing
Scrimba
Skills you'll gain: Prompt Engineering, OpenAI, Generative AI, Data Ethics, ChatGPT, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Application Programming Interface (API), Image Analysis, Large Language Modeling, Safety and Security
Universidad Nacional Autónoma de México
Skills you'll gain: Database Systems, Relational Databases, Database Management, SQL, Databases, Database Design, Information Systems, MySQL, Query Languages, Data Modeling, Transaction Processing, MySQL Workbench, Information Systems Security, Performance Tuning, Conceptual Design
In summary, here are 10 of our most popular cloud security courses
- The Need for Systems Engineering: University of Colorado Boulder
- Core 2: OS, Software, Security and Operational Procedures: IBM
- Digitalisation in Space Research: Technical University of Munich (TUM)
- Design and Analyze Secure Networked Systems: University of Colorado System
- Digital Intelligence for Everyone: Arizona State University
- Gemini in Gmail: Google Cloud
- Cybersecurity and the X-Factor: Kennesaw State University
- Financial Regulation in Emerging Markets and the Rise of Fintech Companies: University of Cape Town
- Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
- Support Vector Machines in Python, From Start to Finish: Coursera Project Network