Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cloud Computing Security Course Catalog
Skills you'll gain: Video Production, Multimedia, Content Creation, Storyboarding, Design, Graphic and Visual Design, Adobe Creative Cloud, Web Content, Video Editing, Infographics, Storytelling
Google Cloud
Skills you'll gain: Change Management, Data Migration, Organizational Change, Google Workspace, Application Deployment, User Provisioning, Cloud Computing, Active Directory, Interoperability, Email Security, End User Training and Support
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Skills you'll gain: User Story, Business Requirements, Requirements Analysis, Requirements Elicitation, Business Analysis, User Requirements Documents, Gap Analysis, Business Systems Analysis, Functional Specification, Business Process Modeling, Stakeholder Management
Google Cloud
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Spreadsheet Software, Calendar Management, Collaborative Software, Version Control, File Management, Document Management, Excel Formulas, Excel Macros, Data Visualization, Meeting Facilitation, Setting Appointments, Email Security, Productivity Software, Product Demonstration, Sales Presentations
- Status: Free
Universidad Austral
Skills you'll gain: Technical Analysis, Digital Assets, Investments, Financial Trading, Blockchain, Portfolio Management, Market Trend, Financial Analysis, Asset Protection, Market Data, Cryptography, Asset Management, FinTech, Trend Analysis, Data Mining, Decision Making
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Architecture, Network Security, Network Infrastructure, Service Oriented Architecture, Network Performance Management, Computer Networking, Emerging Technologies, Network Protocols, Telecommunications, Cloud Computing Architecture, Mobile Security, Interoperability, Authentications, Encryption
- Status: Free
Skills you'll gain: Docker (Software), Containerization, Kubernetes, Application Deployment, Linux Commands, CI/CD, DevOps, YAML, Command-Line Interface, Data Storage, Computer Networking
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
University of California, Davis
Skills you'll gain: Prompt Engineering, Generative AI, ChatGPT, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Innovation, Artificial Neural Networks, Brainstorming, Machine Learning, Deep Learning, Workforce Development, Content Creation, Emerging Technologies, Information Privacy, Safety and Security
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Emerging Technologies, Technology Strategies, Business, Enterprise Application Management
Cloud Computing Security learners also search
In summary, here are 10 of our most popular cloud computing security courses
- Multimedia Content Creation: Adobe
- Planning for a Google Workspace Deployment: Google Cloud
- Enterprise and Infrastructure Security: New York University
- Requirements Gathering in Business Analysis: Microsoft
- Getting Started with Google Workspace en Español: Google Cloud
- Cómo Invertir en Cripto: Universidad Austral
- AI for Cybersecurity: Johns Hopkins University
- 5G Network Fundamentals: Institut Mines-Télécom
- Docker for Beginners with Hands-on labs: KodeKloud
- Asymmetric Cryptography and Key Management: University of Colorado System