Loading...

Course Description

Cloud infrastructure has become the new norm for flexible computing power to supporting a wide range of applications and organizations of any size. As applications have moved to the Cloud, cyber threats have moved as well. Protecting Cloud deployments from attack requires a unique set of approaches, tools, and techniques. This practical course will provide a foundational approach to secure any Cloud infrastructure, with an emphasis on the security principles of Confidentiality, Integrity, and Availability. Key concepts will include Cloud threats, Least Privilege, Defense-in-Depth, Data Asset Protection, Cloud Asset Protection, Identity and Access Management, Vulnerability Management, Network Security, and Cloud Risk Management Processes. Examples will be provided for leading Cloud providers, such as Amazon Web Services (AWS). Current case studies will illustrate key concepts.

Course Outline

Learn the vulnerabilities of the cloud model, ways for companies to assess cloud risk and present methods and architectures that mitigate such risks & enhance the security, integrity, and availability of data in the cloud.

Applies Towards the Following Certificates

Loading...
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .