Cloud Computing Security courses can help you learn about risk assessment, data protection strategies, compliance frameworks, and incident response planning. You can build skills in threat modeling, vulnerability management, and implementing security controls across cloud environments. Many courses introduce tools like AWS Identity and Access Management, Azure Security Center, and various encryption technologies, showing how these skills are applied to safeguard data and maintain compliance in cloud infrastructures.

Columbia University
Skills you'll gain: International Finance, Derivatives, Financial Systems, Balance Sheet, Financial Market, Payment Systems, Banking, Capital Markets, Economics, Market Liquidity, Financial Regulation, Finance, Market Dynamics
Mixed · Course · 3 - 6 Months

Skills you'll gain: Extensible Markup Language (XML), Extensible Languages and XML, Selenium (Software), White-Box Testing, Scalability, Software Testing, Web Applications, Test Automation, Test Script Development, Automation, Scenario Testing, Maintainability, Hypertext Markup Language (HTML)
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Test Automation, Software Testing, System Testing, Database Design, Requirements Analysis, Test Case, Automation, Test Data, Enterprise Application Management, Databases, Application Design, Role-Based Access Control (RBAC)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Web Components, Web Applications, User Interface (UI), Full-Stack Web Development, User Accounts, Event-Driven Programming, Data Persistence, Data Access, Data Validation
Intermediate · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Workspace, Generative AI, AI Security, Agentic Workflows, Prompt Engineering, Large Language Modeling, Enterprise Security, Research Reports
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Financial Trading, Securities Trading, Futures Exchange, Financial Market, Market Data, Portfolio Risk, Order Management, Risk Management, User Accounts, Compliance Management, Authentications, Regulatory Compliance, Profit and Loss (P&L) Management, Security Controls, Account Management, Liquidation, Return On Investment, Digital Assets, Verification And Validation, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Model Deployment, MLOps (Machine Learning Operations), Generative AI, Dependency Analysis, Dashboard, Application Deployment, Continuous Deployment, System Monitoring, Responsible AI, Performance Tuning, Site Reliability Engineering, Release Management, Kubernetes, Application Performance Management, CI/CD, Performance Analysis, Continuous Monitoring, Automation, Cloud Platforms, Data-Driven Decision-Making
Intermediate · Course · 3 - 6 Months

Case Western Reserve University
Skills you'll gain: Criminal Investigation and Forensics, Legal Proceedings, Legal Hearings, Litigation and Civil Justice, International Relations, Legal Strategy, Law, Regulation, and Compliance, Public Safety and National Security, Ethical Standards And Conduct, Case Law, Interactive Learning, Case Studies
Mixed · Course · 1 - 3 Months

Skills you'll gain: Apache Airflow, Data Pipelines, Scalability, Feature Engineering, Extract, Transform, Load, Workflow Management, AI Workflows, Data Integration, Database Design, Data Modeling, Data Architecture, Data Quality, Data Storage
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Model Deployment, Transfer Learning, Keras (Neural Network Library), Deep Learning, Applied Machine Learning, Tensorflow, PyTorch (Machine Learning Library), Convolutional Neural Networks, Artificial Neural Networks, Machine Learning Methods, Application Frameworks, Model Evaluation, Performance Tuning
Advanced · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Digital Forensics, Security Requirements Analysis, Penetration Testing, Information Systems Security, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cybersecurity, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months

Beginner · Course · 3 - 6 Months