Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cloud Security Course Catalog
Skills you'll gain: Cloud Computing Architecture, Cloud Infrastructure, Cloud Solutions, Solution Architecture, Process Optimization, Google Cloud Platform, Cloud Computing, Cloud Storage, Configuration Management, Cloud Security, Network Infrastructure, Key Performance Indicators (KPIs), Business Requirements
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Incident Management, Application Performance Management, Continuous Integration, Continuous Monitoring, Linux Commands, Scripting
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Data Management
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Security Awareness, Threat Management, Malware Protection, Vulnerability Management, Artificial Intelligence
Skills you'll gain: Real Time Data, Data Pipelines, Google Cloud Platform, Data Processing, Big Data, Analytics, SQL, Data Transformation, Performance Tuning, Scalability
University of Colorado System
Skills you'll gain: Database Design, Data Warehousing, Relational Databases, Decision Support Systems, Business Intelligence, Data Modeling, Database Management Systems, Databases, Dashboard, Business Process Management, SQL, Star Schema, Data Governance, Data Integration, Oracle Databases, Performance Measurement, Extract, Transform, Load, Business Analytics, MicroStrategy, Data Visualization Software
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Cloud Security, Identity and Access Management, Network Security, Data Security, Security Controls, Firewall, Payment Card Industry (PCI) Data Security Standards, Google Cloud Platform, Cloud Computing Architecture, Encryption, CI/CD, Incident Response
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Document Management, Data Integrity, Technical Communication, Technical Documentation
Skills you'll gain: Azure Synapse Analytics, Microsoft Azure, Power BI, Databricks, Data Processing, Database Administration, Cloud Services, Data Warehousing, Database Systems, Databases, Dashboard, Data Architecture, NoSQL, Apache Spark, Relational Databases, MySQL, Data Store, SQL, Cloud Storage, Database Management
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, Encryption, Network Model, Data Structures, Distributed Computing, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Virtual Machines, Verification And Validation
In summary, here are 10 of our most popular cloud security courses
- Preparing for your Professional Cloud Architect Journey: Google Cloud
- Troubleshooting and Debugging Techniques: Google
- Security Operations: ISC2
- Cybersecurity Case Studies and Capstone Project: IBM
- Building Resilient Streaming Analytics Systems on Google Cloud: Google Cloud
- Data Warehousing for Business Intelligence: University of Colorado System
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University
- Preparing for Your Professional Cloud Security Engineer Journey - 日本語版: Google Cloud
- Incident Response and Digital Forensics: IBM