Cloud security courses can help you learn about risk management, data protection strategies, compliance frameworks, and identity and access management. You can build skills in threat detection, incident response, and implementing security protocols across various cloud environments. Many courses introduce tools such as AWS Security Hub, Azure Security Center, and Google Cloud Security Command Center, showing how these tools support the skills you develop in safeguarding cloud infrastructure and ensuring data integrity.

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud-Native Computing, Serverless Computing, Cloud Applications, Cloud Services, Application Development, Containerization, Cloud Security, Application Deployment, Identity and Access Management, Integration Testing, Scalability
Beginner · Course · 1 - 3 Months

Intermediate · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Software Engineering, Distributed Computing, Extract, Transform, Load, Google Cloud Platform, Big Data, Cloud Computing, Serverless Computing, Cloud Technologies, Data Pipelines, Amazon S3, Command-Line Interface, Continuous Integration, Python Programming, Data Governance, NumPy, Rust (Programming Language)
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Generative AI Agents, LLM Application, Responsible AI, Artificial Intelligence, Prompt Engineering, Cloud Security, Large Language Modeling, Enterprise Security
Beginner · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Assessments, Vulnerability Management, Security Management, Security Controls, Google Cloud Platform, Configuration Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Configuration, System Monitoring, Azure Active Directory, Windows Servers, Remote Access Systems
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Contingency Planning, Business Continuity Planning, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Cybersecurity, Information Systems Security, Infrastructure Security, Enterprise Security, Configuration Management, Data Security, Change Control
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months