Course Code: cse
Duration: 21 hours
Prerequisites:
  • For success in this cloud security training course, a basic understanding of TCP/IP, network security, information security principles are helpful but not required for this course. Familiarity with the Linux command-line or common cloud technology concepts is a bonus.
Overview:

WHAT IS CLOUD SECURITY?

Cloud security is taking traditional security practices and adapting them to work for public clouds while understanding and leveraging the shared responsibility model. It involves constant application of available, incomplete, and often inconsistent vendor-provided controls to protect an organization's applications, data, and brand while operating in a "cloud" environment that the organization ultimately has minimal control over.

License to Learn Cloud Security

Research shows that most enterprises have strategically decided to deploy a multi cloud platform, including Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and/or other cloud service providers. Mature CSPs have created a variety of security services that can help customers use their products in a more secure manner, but only if the customer knows about these services and how to use them properly. This cloud security course covers real-world lessons using security services created by the Big 3 CSPs, as well as open-source tools. Each section of this cloud security training features hands-on lab exercises to help students hammer home the lessons learned. We progressively layer multiple security controls in order to end the course with a functional security architecture implemented in the cloud.

BUSINESS TAKEAWAYS

  • Understand the current cloud deployment
  • Protect cloud-hosted workloads, services, and virtual machines
  • Cost-effectively select appropriate services and configure properly to adequately defend cloud resources
  • Get in front of common security misconfigurations BEFORE they are implemented in the cloud
  • Ensure business is aligning to industry regulations and laws when operating in the cloud
  • Decrease adversary dwell time in compromised cloud deployments

SKILLS LEARNED

  • Navigate your organization through the security challenges and opportunities presented by cloud services
  • Identify the risks of the various services offered by cloud service providers (CSPs)
  • Select the appropriate security controls for a given cloud network security architecture
  • Evaluate CSPs based on their documentation, security controls, and audit reports
  • Confidently use the services of any of the leading CSPs
  • Protect secrets used in cloud environments
  • Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment
  • Identify the risks and risk control ownership based on the deployment models and service delivery models of the various products offered by cloud service providers (CSPs)
  • Evaluate the trustworthiness of CSPs based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem
  • Secure access to the consoles used to access the CSP environments
  • Implement network security controls that are native to both AWS and Azure
  • Follow the penetration testing guidelines put forth by AWS and Azure to invoke your "inner red teamer" to compromise a full stack cloud application
Course Outline:
  • Section 1: Identity and Access Managment (IAM)
  • Section 2: Compute and Configuration Management
  • Section 3: Data Protection and Automation
  • Section 4: Restricting network access, Web Application Firewall (WAF), Cloud services logging, IaaS logging
  • Section 5: Compliance, Incident Response, and Penetration Testing
  • Section 6: CloudWars
Sites Published:

United Arab Emirates - Cloud Security Essentials

Qatar - Cloud Security Essentials

Egypt - Cloud Security Essentials

Saudi Arabia - Cloud Security Essentials

South Africa - Cloud Security Essentials

Morocco - Cloud Security Essentials

Tunisia - Cloud Security Essentials

Kuwait - Cloud Security Essentials

Oman - Cloud Security Essentials

Kenya - Cloud Security Essentials

Nigeria - Cloud Security Essentials

Botswana - Cloud Security Essentials

Slovenia - Cloud Security Essentials

Croatia - Cloud Security Essentials

Serbia - Cloud Security Essentials

Bhutan - Cloud Security Essentials

Nepal - Cloud Security Essentials

Uzbekistan - Cloud Security Essentials