Cloud Security Essentials (TCLD)
This course will provide:
• Navigate your organization through the security challenges and opportunities presented by cloud services
• Identify the risks of the various services offered by cloud service providers (CSPs)
• Select the appropriate security controls for a given cloud network security architecture
• Evaluate CSPs based on their documentation, security controls, and audit reports
• Confidently use the services of any of the leading CSPs
• Protect secrets used in cloud environments
• Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment
• Identify the risks and risk control ownership based on the deployment models and service delivery models of the various products offered by cloud service providers (CSPs).
• Evaluate the trustworthiness of CSPs based on their security documentation, service features, third- party attestations, and position in the global cloud ecosystem.
• Secure access to the consoles used to access the CSP environments.
• Implement network security controls that are native to both AWS and Azure.
• Follow the penetration testing guidelines put forth by AWS and Azure to invoke your "inner red teamer" to compromise a full stack cloud application.
Download Brochure

