Cloud Security Essentials (C|SE) Training
Cloud Security Essentials (C|SE) Training
De C|SE training is ontworpen om u een sterke basis te geven in de technieken en tools die ethische hackers gebruiken om zwakke plekken in de beveiliging te identificeren en aan te pakken.
Lees meer- Merk:
- EC-Council
- Beschikbaarheid:
- Op voorraad
- Levertijd:
- Voor 17:00 uur besteld! Start vandaag. Gratis Verzending.
- Award Winning E-learning
- De laagste prijs garantie
- Persoonlijke service van ons deskundige team
- Betaal veilig online of op factuur
- Bestel en start binnen 24 uur
Cloud Security Essentials (C|SE) Training
Cloud Security is een basiscursus over cloud computing en beveiligingsfundamentals, gegevensbescherming en encryptie in de cloud en meer. Deze cursus bereidt je voor op het beveiligen van identiteiten, gegevens en toepassingen binnen cloudproviders en hybride infrastructuren. Test je kennis met CTF-gebaseerde Capstone-projecten en valideer je nieuw verworven vaardigheden in gesurveilleerde examens. Met 6 hands-on labs en meer dan 10 uur eersteklas training voorziet de C|SE cursisten van praktische vaardigheden om cloudoplossingen te beveiligen.
Cursusinhoud
Module 01: Cloud Computing & Security Fundamentals
Cloud Compuing and Security Fundamentals
What Is Cloud Compuing?
Cloud Compuing Types and Service Models
• Different Types of Cloud Deployment Models
• Different Types of Cloud Deployment Models: Private
• Different Types of Cloud Deployment Models: Public
• Different Types of Cloud Deployment Models: Hybrid
• Different Types of Cloud Service Models
• Different Types of Cloud Service Models: Infrastructure as a Service (IaaS)
• Different Types of Cloud Service Models: Platform as a Service (PaaS)
• Different Types of Cloud Service Models: So ware as a Service (SaaS)
Cloud Security Challenges and Concerns
• Cloud Security Challenges and Concerns
Cloud and Security Responsibilities
• Cloud Shared Responsibilities
• Shared Responsibility Model for Cloud and Security
Evaluating Cloud Service Providers
• Cloud Service Providers (CSP)
• Comparing The Top 3 Cloud Service Providers (CSPs)
• Comparing The Top 3 Cloud Service Providers (CSPs): Microsoft
• Comparing The Top 3 Cloud Service Providers (CSPs): AWS
• Comparing The Top 3 Cloud Service Providers (CSPs): GCP
Cloud Security Benefits
• Cloud Characteristics
• Cloud Security Benefits
Threats and Atacks in Cloud Environments
• Threats And Atacks in Cloud Environments
• OWASP Cloud-Native Application Security Top 10
• Phishing
• Spear Phishing
• Denial-Of-Service Atack
• Brute Force Atacks
• Web Atacks
• SQL Atacks
Cloud Security Design Principles
• C-I-A Triad
• Defense In Depth
• Zero Trust Methodology
• Google Cloud Adoptoon Framework
Cloud Security Architecture
• Cloud Transformation and Security Architecture
• Secure Landing Zones
• AWS Architecture Example
• GCP Architecture Example
• AZURE Architecture Example
• Google Cloud Adoption Framework
Module 02: Identity And Access Management (IAM) in the Cloud
IAM Fundamentals
• IAM Fundamentals
• Key IAM Terms
• Defining IAM
• Legacy vs. Modern IAM
• Active Directory Authentication
• Cloud Identity Provider
• Cloud Identity Governance
Principal and Roles of IAM in the Cloud
• Cloud Identity Governance
• Role Permissions
Role-based Access Control (RBAC)
• Role-based Access Control (RBAC)
Identity Federation
• Identity Federation
• Hybrid Identity Federation
• Multi cloud Identity Federation
• Cloud and External Provider Federation
Single Sign-on (SSO) and Self-Service Password Reset (SSPR)
• Single Sign-on (SSO)
• Self-Service Password Reset (SSPR)
Multifactor Authentication (MFA)
• Multifactor Authentication (MFA)
Principle of Least Privilege
• Principle of Least Privilege
• Conditional and Behavior Based Access
IAM Auditing and Monitoring
• IAM Auditing and Monitoring
Module 03: Data Protection and Encryption in the Cloud
Data Classification and Lifecycle
• Governing And Securing Your Data
• Data Classification
• Protect Your Data
• Project Overview
• Data Retention
• Governing And Securing Your Data
Encryption Techniques (at Rest, in Transit)
• Encryption Types
• Governing And Securing Your Data
• Encryption In Transit
Customer vs. Cloud Provider Managed Keys
• Customer Vs. Cloud Provider Managed Keys
• Key Management in the Cloud
• Azure Key Vault
• AWS Key Management Service
• Google Cloud Platform Encryption
Data Loss Prevention (DLP)
• Data Loss Prevention
• Cloud Provider Data Loss Prevention (DLP) Solutions
Backup and Disaster Recovery Strategies
• Backup Vs. Replication
• Cloud-Based Site Recovery
• Cloud Backup
Module 04: Network Security in Cloud
Cloud Network Fundamentals
• Cloud Networks
Virtual Private Clouds (VPC)
• AWS VPC Architecture
• Azure Virtual Network (VNET)
Network Isolation and Segmentation
• Network Segmentation
• AWS Elastic Load Balancers
• Azure Front Door and Application Gateway
• DDoS Protection
Network Access Control Lists (NACLs) and Network Security Groups (NSG)
• AWS NACL and Security Groups
• Azure Network Security Groups (NSG)
Remote Access and Connections
• VPC Endpoint Connections
• AWS Remote Connections with Transit Gateway
• Azure Private Links
• Remote Management – Azure Bastion
• Just in Time VM Access
• AWS NAT Instances Vs. NAT Gateways
• NAT Instance Vs. Bastion host
Firewalls and Intrusion Detec on
• Azure Firewall
• Web Application Firewall
• AWS Web Application Firewall (WAF)
• Intrusion Detection Vs. Intrusion Prevention
Module 05: Application Security in Cloud
Secure Software Development Lifecycle (SDLC) in the Cloud
• Secure Software Design
• Cloud Security Controls within Security Objective
• Secure Software Development Lifecycle
Web Application Firewall (WAF) in Cloud Environments
• Why use a WAF?
• Web Application Firewall in Azure
• AWS Web Application Firewall (WAF)
Web Application Security and OWASP Top Ten
• Common Atacks
• Ransomware Atack
Security by Design Principles for Cloud Applications
• Secure Application Design
• Traceability of Data
• Data Integrity
• Key Secure Software Design Concepts
• DevSecOps
Secure Coding Practices
• Secure Code Testing
• Runtime Application Self-Protection (RASP)
API Security and Integration Best Practices
• API Security Design and Development
• AWS Config
• Secure Azure API Management
Serverless Security Considera ons
• Serverless Security Practices
• Azure Functions Security
• Web Application Firewall
Container Security (Docker, Kubernetes)
• AWS Config
• Container Security Practices
Module 06: Cloud Security Monitoring and Incident Response
Cloud Logging
• Importance of Logging
• Cloud Logging
Cloud Security Monitoring
• Cloud Native Tools
• Azure Monitor
• Azure Network Watcher
• Log Analytics
• Azure Arc
• AWS CloudTrail
• AWS CloudWatch
SIEM and SOAR
• Information and Event Management
• SIEM AND SOAR
Cloud-native Monitoring Solutions
• Security Posture Management
• Microsoft Defender for Cloud - CSPM
• Amazon Security Hub
Continuous Cloud Security Monitoring
• Cloud Native Application Protection Platform (CNAPP)
• Microsoft Defender for Cloud - CNAPP
• CNAPP capabilities within AWS using CloudGuard
• Google Cloud Armor CNAPP
Incident Response and Investigation in the Cloud
• Timeline of A Breach
• Incident Response
Module 07: Cloud Security Risk Assessment and Management
Identifying Cloud Security Risks
• Cloud Risk Assessment Checklist
• Common Cloud Security Risks
• Top Cloud Vulnerabilities
• Risk Categories
Risk Assessment Frameworks for Cloud Environments
• Risk Management Tiers
• Risk Management Strategy
• NIST Risk Management Framework SP 800-37 REV. 2
Cloud Security Controls and Countermeasures
• Defense In Depth
• Security Controls and Countermeasures
• Business Continuity Plans
• Disaster Recovery Plan
• BCP and DRP Working Together
Threat Modeling and Vulnerability Assessment in Cloud Environments
• Cloud Threat Modeling
• Cloud Threat Modeling Resources
• Vulnerability Assessments
• Vulnerability Scanning
Quanlitative vs. Qualita ve Risk Assessment Approaches
• Risk Analysis
• Qualitative Risk Analysis
• Qualitative Risk Analysis
• Risk Analysis Decision Matrix
Cloud Risk Treatment, Response, and Mitigation
• Residual Risk
• Risk Response
• Responses To Risk
Module 08: Cloud Compliance and Governance
Regulatory and Industry Compliance
• Regulatory Compliance
• General Data Protection Regulation (GDPR)
• Federal Information Security Management Act (FISMA)
• Family Educational Rights and Privacy Act (FERPA)
• International Standards Organization (ISO)
• National Institute of Standards & Technology (NIST)
• NIST SP 800-53
• FedRAMP
• Industry Compliance Standards
• PCI-DSS
• 2023 UPDATES to PCI-DSS
• Sarbanes-Oxley Act (SOX)
• GLBA
• HIPAA
• HIPAA Security Rule
• HITRUST Common Security Framework
• HITRUST Certification
Cloud Security Standards
• Cloud Security Standards
• NIST Cybersecurity Framework
• ISO 27001
• Center for Internet Security (CIS)
• Cloud Security Alliance (CSA
• CSA Cloud Control Matrix
• CSA Cloud Control Matrix List of Controls
Cloud Security Governance and Risk Management
• Keys To Maintaining Compliance
• Cloud Security Governance
• Cloud Security Assessments and Auditing
• Cloud Security Assessments Methodology
• Cloud Security Assessments Challenges
• Cloud Monitoring and Management
• Risk Management Process
• Responses To Risk
Auditing and Monitoring Cloud Resources
• Cloud-Native Audi ng
• Azure Policy
• Microsoft Defender For Cloud
• AWS Config Manager
• AWS Inspector
• Google Cloud Compliance Reports Manager
Cloud Security Assessment and Penetration Testing
• Cloud Security Assessments
• Cloud Security Assessment
• Cloud Security Assessment
• Ethical Penetration Testing
• Cloud Penetration Testing and Limitations
Lesduur | 15:06:25 |
---|---|
Taal | Engels |
Certificaat van deelname | Ja |
Online toegang | 1 jaar onbeperkte toegang |
Voortgangsbewaking | Ja |
Er zijn nog geen reviews geschreven over dit product.
OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'
OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.
Beoordelingen
Er zijn nog geen reviews geschreven over dit product.