Cloud Computing Security courses can help you learn about risk assessment, data protection strategies, compliance frameworks, and incident response planning. You can build skills in threat modeling, vulnerability management, and implementing security controls across cloud environments. Many courses introduce tools like AWS Identity and Access Management, Azure Security Center, and various encryption technologies, showing how these skills are applied to safeguard data and maintain compliance in cloud infrastructures.

LearnQuest
Skills you'll gain: Continuous Monitoring, Cybersecurity, Security Management, Network Security, Security Strategy, Risk Management Framework, Internet Of Things, Cyber Risk, Threat Management, Cyber Security Strategy, Infrastructure Security, Hardware Architecture, Security Engineering, Encryption, Communication Systems, Wireless Networks, Information Systems Security, Vulnerability Assessments, Risk Analysis, Network Infrastructure
Beginner · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Application Security, Data Security
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Network Security, Brute-force attacks, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Application Security, Angular, OAuth, Test Driven Development (TDD), Web Components, Cryptography, Data Validation, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Azure Active Directory, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Security Controls, Continuous Monitoring, Key Management, Threat Detection, Virtual Machines, Incident Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months
Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response
Beginner · Course · 1 - 4 Weeks

Arizona State University
Skills you'll gain: Data Storage Technologies, Statistics, Data Storage, Database Software, Statistical Hypothesis Testing, Data Manipulation
Intermediate · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Cyber Risk, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, Cybersecurity, Cyber Governance, Data Security, Cyber Security Policies, Computer Security, Digital Assets, Security Testing, Cyber Risk, Incident Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks