Cloud Computing Security courses can help you learn about risk assessment, data protection strategies, compliance frameworks, and incident response planning. You can build skills in threat modeling, vulnerability management, and implementing security controls across cloud environments. Many courses introduce tools like AWS Identity and Access Management, Azure Security Center, and various encryption technologies, showing how these skills are applied to safeguard data and maintain compliance in cloud infrastructures.

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Data Lakes, Dataflow, Data Pipelines, Data Infrastructure, Apache Kafka, Tensorflow, Data Architecture, MLOps (Machine Learning Operations), Data Governance, Data Migration, Apache Spark, Model Deployment, Real Time Data, Data Processing, Data Warehousing, Big Data, Extract, Transform, Load, Data Quality, Metadata Management
Intermediate · Professional Certificate · 3 - 6 Months

Google Cloud
Skills you'll gain: Kubernetes, Application Deployment, Google Cloud Platform, Cloud Applications, Debugging, Event Monitoring, Cloud Management, Command-Line Interface, Terraform, Cloud Storage
Beginner · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Cloud Applications, Google Cloud Platform, Database Development, Data Access, Data Store, Cloud Computing, Software Installation, Web Development Tools, Application Development, Web Development, Cloud Management
Beginner · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Google Cloud Platform, Network Troubleshooting, Cloud Engineering, Cloud Services, Problem Management, Cloud Infrastructure, Cloud Management, Incident Response
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Linux Administration, Linux Servers, Virtual Networking, Infrastructure As A Service (IaaS)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Network Security, System Configuration, Network Administration, Amazon Web Services, Virtual Private Networks (VPN), Infrastructure Security, Network Troubleshooting, Security Information and Event Management (SIEM), Threat Management, Endpoint Security, Intrusion Detection and Prevention, System Monitoring, Threat Detection, Cloud Deployment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), AI Security, Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Incident Management, Anomaly Detection
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Serverless Computing, Google Cloud Platform, Cloud API, Image Analysis, Cloud Storage, File Management, Computer Vision, Cloud Computing, Data Lakes, Network Analysis
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Google Cloud Platform, Network Troubleshooting, Problem Management, Cloud Services, Issue Tracking, Cloud Infrastructure, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Response, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Assurance, Digital Forensics, Security Controls
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months