Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Cloud Computing Security Course Catalog
- Status: Free
Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Internet Of Things, Wireless Networks, General Networking, Emerging Technologies, Networking Hardware, Embedded Software, Electronic Hardware, Embedded Systems, Information Technology Architecture, Infrastructure Architecture, Software Architecture, Computer Hardware, System Programming, Computer Programming Tools, Integrated Development Environments, Python Programming
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
Skills you'll gain: Object-Relational Mapping, Django (Web Framework), Bootstrap (Front-End Framework), SQL, Relational Databases, Cloud Applications, Database Management, Back-End Web Development, Databases, Database Design, Full-Stack Web Development, Application Deployment, Authentications, Model View Controller, Object Oriented Programming (OOP), Authorization (Computing), Application Development
Skills you'll gain: Hardware Troubleshooting, Network Security, General Networking, Network Administration, Infrastructure Security, Network Troubleshooting, Technical Support, Mobile Security, Desktop Support, System Support, Computer Hardware, Technical Services, Information Technology, Operating Systems, Mac OS, Virtualization and Virtual Machines, Test Planning, Microsoft Windows, Unix, Network Protocols
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
- Status: Free
Hebrew University of Jerusalem
Skills you'll gain: Artificial Neural Networks, Life Sciences, Computer Science, Psychology, Network Analysis, Anatomy, Simulation and Simulation Software, Mathematical Modeling, Data Ethics
Skills you'll gain: Data Governance, Data Management, Information Management, Metadata Management, Data Strategy, Governance, Data Integrity, Cloud Management, Regulatory Requirements, Compliance Management, Data Quality, Data Security, Cloud Solutions
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Instituto Tecnológico de Aeronáutica
Skills you'll gain: JUnit, Object Oriented Programming (OOP), Java, Java Programming, Object Oriented Design, Unified Modeling Language, Unit Testing, Software Engineering, Agile Software Development, Software Design, Software Development, Programming Principles, Eclipse (Software)
Google Cloud
Skills you'll gain: Data Governance, Data Management, Data Lakes, Data Architecture, Data Access, Cloud Storage, Metadata Management, Data Warehousing, Database Management, Relational Databases, Query Languages, NoSQL, Star Schema, Big Data, Google Cloud Platform, Data Processing, Performance Tuning
Skills you'll gain: Embedded Software, Performance Tuning, System Programming, Software Development Tools, Embedded Systems, Microarchitecture, Software Development, Hardware Architecture, Debugging, Program Development, Application Security, Computer Architecture, System Configuration, C (Programming Language), Application Development, C++ (Programming Language), Computer Programming, System Requirements, Computer Hardware, Cybersecurity
Imperial College London
Skills you'll gain: Health Assessment, Sanitation, Infection Control, Program Evaluation, Infectious Diseases, Preventative Care, Environment Health And Safety, Behavioral Economics, Policy Analysis, Epidemiology, Analysis, Behavioral Health, Emergency Response, Water Resources, Health And Safety Standards, Health Systems, Public Safety and National Security, Health Care, Social Sciences, Culture
Cloud Computing Security learners also search
In summary, here are 10 of our most popular cloud computing security courses
- Introduction and Programming with IoT Boards:Â Pohang University of Science and Technology(POSTECH)
- Homeland Security and Cybersecurity:Â University of Colorado System
- Django Application Development with SQL and Databases:Â IBM
- Practice Exams for CompTIA A+ Certification: Core 1 & Core 2:Â IBM
- AI Strategy and Governance:Â University of Pennsylvania
- Synapses, Neurons and Brains :Â Hebrew University of Jerusalem
- Fundamentals of Data Governance:Â Edureka
- Cybersecurity Foundations:Â Infosec
- Orientação a Objetos com Java: Instituto Tecnológico de Aeronáutica
- Data Management and Storage in the Cloud:Â Google Cloud