Cloud Security Essentials Training Course
WHAT IS CLOUD SECURITY?
Cloud security is taking traditional security practices and adapting them to work for public clouds while understanding and leveraging the shared responsibility model. It involves constant application of available, incomplete, and often inconsistent vendor-provided controls to protect an organization's applications, data, and brand while operating in a "cloud" environment that the organization ultimately has minimal control over.
License to Learn Cloud Security
Research shows that most enterprises have strategically decided to deploy a multi cloud platform, including Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), and/or other cloud service providers. Mature CSPs have created a variety of security services that can help customers use their products in a more secure manner, but only if the customer knows about these services and how to use them properly. This cloud security course covers real-world lessons using security services created by the Big 3 CSPs, as well as open-source tools. Each section of this cloud security training features hands-on lab exercises to help students hammer home the lessons learned. We progressively layer multiple security controls in order to end the course with a functional security architecture implemented in the cloud.
BUSINESS TAKEAWAYS
- Understand the current cloud deployment
- Protect cloud-hosted workloads, services, and virtual machines
- Cost-effectively select appropriate services and configure properly to adequately defend cloud resources
- Get in front of common security misconfigurations BEFORE they are implemented in the cloud
- Ensure business is aligning to industry regulations and laws when operating in the cloud
- Decrease adversary dwell time in compromised cloud deployments
SKILLS LEARNED
- Navigate your organization through the security challenges and opportunities presented by cloud services
- Identify the risks of the various services offered by cloud service providers (CSPs)
- Select the appropriate security controls for a given cloud network security architecture
- Evaluate CSPs based on their documentation, security controls, and audit reports
- Confidently use the services of any of the leading CSPs
- Protect secrets used in cloud environments
- Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment
- Identify the risks and risk control ownership based on the deployment models and service delivery models of the various products offered by cloud service providers (CSPs)
- Evaluate the trustworthiness of CSPs based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem
- Secure access to the consoles used to access the CSP environments
- Implement network security controls that are native to both AWS and Azure
- Follow the penetration testing guidelines put forth by AWS and Azure to invoke your "inner red teamer" to compromise a full stack cloud application
Course Outline
- Section 1: Identity and Access Managment (IAM)
- Section 2: Compute and Configuration Management
- Section 3: Data Protection and Automation
- Section 4: Restricting network access, Web Application Firewall (WAF), Cloud services logging, IaaS logging
- Section 5: Compliance, Incident Response, and Penetration Testing
- Section 6: CloudWars
Requirements
- For success in this cloud security training course, a basic understanding of TCP/IP, network security, information security principles are helpful but not required for this course. Familiarity with the Linux command-line or common cloud technology concepts is a bonus.
Open Training Courses require 5+ participants.
Cloud Security Essentials Training Course - Booking
Cloud Security Essentials Training Course - Enquiry
Cloud Security Essentials - Consultancy Enquiry
Consultancy Enquiry
Testimonials (3)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job
Toby
Course - Application Security in the Cloud
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.
Tim Wilkes - Gamma
Course - OpenStack Security
The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.
Victor Miguel Prado Saster - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
Upcoming Courses
Related Courses
Cloud Computing Security Knowledge (CCSK) Preparation Course
21 HoursCloud Computing Security Knowledge (CCSK) Preparation Course
The CCSK course is intended to provide understanding of security issues and best practices over a broad range of cloud computing domains. As cloud computing is becoming the dominant IT system, CCSK is applicable to a wide variety of IT and information security jobs in virtually every organization. The CCSK is strongly recommended for IT auditors, system administrators, security professionals with at least 5 years of experience
After completing this course, the student will be able to:
- Validate their competence gained through experience in cloud security
- Prepare for the CCSK exam.
- Demonstrate their technical knowledge, skills, and abilities to effectively develop a holistic cloud security program relative to globally accepted standards
- Differentiate themselves from other candidates for desirable employment in the fast-growing cloud security market
- Gain access to valuable career resources, such as tools, networking and ideas exchange with peers
- Protect against threats with qualified professionals who have the expertise to competently design, build, and maintain a secure cloud business environmen
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Certificate of Cloud Security Knowledge
14 HoursDescription:
This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of exercises involving a scenario that brings a fictional organization securely into the cloud. After completing this training, students will be well prepared for the CCSK certification exam, sponsored by Cloud Security Alliance. This second day of training includes additional lecture, although students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises.
Objectives:
This is a two day class that begins with the CCSK- Basic training, followed by a second day of additional content and hands-on activities
Target Audience:
This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.
Certificate of Cloud Security Knowledge (CCSK) Foundation (CSA authorized)
14 HoursThe CCSK Foundation course starts with the fundamentals, then increases in complexity as it works through all 16 domains of the CSA Security Guidance, recommendations from the European Union Agency for Network & Information Security (ENISA), and an overview of the Cloud Controls Matrix.
This is a Cloud Security Alliance (CSA) authorized course and NobleProg is an official CSA Training Partner.
This course is delivered by CSA Authorized CCSK Instructors.
All attendees receive:
- official CSA CCSK Foundation course certificates
- official CCSK Foundation Student Handbooks
- 1 CCSK exam voucher and 1 re-attempt exam voucher
This course covers the most current version of the CCSK exam - currently version 4.1.
Certificate of Cloud Security Knowledge (CCSK) Plus (CSA authorized)
21 HoursThe CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional organization securely into the cloud, which gives them the opportunity to apply their knowledge by performing a series of activities that would be required in a real-world environment.
The CCSK Plus Course includes all the modules in the CCSK Foundation course with additional material.
This is a Cloud Security Alliance (CSA) authorized course and NobleProg is an official CSA Training Partner.
This course is delivered by CSA Authorized CCSK Instructors.
All attendees receive:
- official CSA CCSK Plus course certificates
- official CCSK Foundation Student Handbooks
- 1 CCSK exam voucher and 1 re-attempt exam voucher
This course covers the most current version of the CCSK exam - currently version 4.1.
Certified Cloud Security Professional
35 HoursCCSP is a global credential born from the expertise of the two industry-leading stewards of information systems and cloud computing security, (ISC)² and CSA. The CCSP credential is appropriate and applicable to cloud security in a global environment. This is especially important given the legal, regulatory and compliance concerns that come with multi-jurisdictional housing of personally identifiable information (PII).
For those who qualify, the CCSP exam will test their competence in the six CCSP domains of the (ISC)² Common Body of Knowledge (CBK), which cover:
- Architectural Concepts & Design Requirements
- Cloud Data Security
- Cloud Platform & Infrastructure Security
- Cloud Application Security
- Operations
- Legal & Compliance
Application Security in the Cloud
21 HoursMigrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.
Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.
The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.
The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Understand major threats and risks in the cloud domain
- Learn about elementary cloud security solutions
- Get information about the trust and the governance regarding the cloud
- Have a practical understanding of cryptography
- Get extensive knowledge in application security in the cloud
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Understand the challenges of auditing and evaluating cloud systems for security
- Learn how to secure the cloud environment and infrastructure
- Get sources and further readings on secure coding practices
Audience
Developers, Managers, Professionals
OpenStack Security
14 HoursThe course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments