Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cloud Computing Security Course Catalog
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Desktop Support, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Encryption, Identity and Access Management, Mac OS
Johns Hopkins University
Skills you'll gain: Injury Prevention, Public Safety and National Security, Social Justice, Criminal Investigation and Forensics, Public Health, Public Policies, Policy Analysis, Health Policy, Safety and Security, Law, Regulation, and Compliance, Community Health, Risk Analysis
New York University
Skills you'll gain: Supervised Learning, Reinforcement Learning, Applied Machine Learning, Machine Learning, Statistical Methods, Dimensionality Reduction, Unsupervised Learning, Machine Learning Algorithms, Artificial Neural Networks, Decision Tree Learning, Predictive Modeling, Financial Trading, Financial Market, Derivatives, Scikit Learn (Machine Learning Library), Markov Model, Regression Analysis, Deep Learning, Market Liquidity, Financial Services
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
University of Michigan
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Market Dynamics, Digital Assets, Cryptography, Technical Analysis, Business Solutions, Business Analysis, Payment Systems, Algorithms, Distributed Computing
University of Michigan
Skills you'll gain: Data Ethics, Data Sharing, Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Intellectual Property, Data Analysis, Social Sciences, Sampling (Statistics), Data-Driven Decision-Making, Diversity Awareness
Advancing Women in Tech
Skills you'll gain: Product Management, Product Roadmaps, Product Strategy, Product Requirements, New Product Development, Product Lifecycle Management, Competitive Analysis, Customer experience strategy (CX), Customer Insights, Innovation, Persuasive Communication, Market Analysis
Dartmouth College
Skills you'll gain: Command-Line Interface, C (Programming Language), Linux Commands, Computer Programming Tools, Embedded Systems, Embedded Software, Programming Principles, Computer Engineering, Linux Servers, Linux, File Systems, System Programming, Build Tools, Data Structures, Unix, Program Development, Development Environment, Algorithms, Computer Architecture, Software Documentation
University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, OSI Models, Network Routing, Network Infrastructure, Software-Defined Networking, Local Area Networks, Virtualization
University of California, Santa Cruz
Skills you'll gain: C (Programming Language), Debugging, C++ (Programming Language), Data Structures, Computer Programming, Command-Line Interface, Algorithms, Integrated Development Environments, Program Development, File Systems
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Anomaly Detection, Deep Learning, Applied Machine Learning, Artificial Neural Networks, Matlab, Application Deployment, PyTorch (Machine Learning Library), Machine Learning, Motion Graphics, Data Visualization, Automation, Data Mapping, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Spatial Data Analysis, Predictive Modeling, Visualization (Computer Graphics), Data Synthesis
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Authorization (Computing), Verification And Validation, Java, Code Review, Linux, Programming Principles, Debugging
Cloud Computing Security learners also search
In summary, here are 10 of our most popular cloud computing security courses
- Cybersecurity and Privacy: Microsoft
- Reducing Gun Violence in America: Evidence for Change: Johns Hopkins University
- Machine Learning and Reinforcement Learning in Finance: New York University
- Introduction to Applied Cryptography: University of Colorado System
- Blockchain and Cryptocurrency Explained: University of Michigan
- Data Science Ethics: University of Michigan
- The Business of Product Management I: Advancing Women in Tech
- C Programming with Linux: Dartmouth College
- TCP/IP and Advanced Topics: University of Colorado System
- C for Everyone: Structured Programming: University of California, Santa Cruz