This bootcamp covers all relevant information to design, implement and audit relevant security features in AWS, Azure and GCP. It also covers all tools and techniques to detect malware on a cloud virtual machine and perform preliminary file-system forensics.
Your course package is designed to provide maximum learning and convenience. This is included in the price of your course:
We´ll prepare you for the following exam, which is not included in your course or your course fee.
Basic TCP/IP and networking knowledge
First hands-on with at least one cloud service (AWS, Azure or GCP)
Basic knowledge of the Windows and Linux command-line
Using our engaging learning methodology including a variety of tools, we’ll cover the entire curriculum.
Attacking the Cloud and Responding to Intrusions
The candidate will demonstrate a basic understanding of the overall process and considerations when conducting a penetration test or responding to an incident involving public cloud resources.
Cloud Account Fundamentals
The candidate will demonstrate an understanding of cloud identity fundamentals and access management principles. The candidate will show familiarity of security best practices to control access to a cloud environment using each identity type.
The candidate will demonstrate a basic understanding of provisioning and managing cloud infrastructure using Infrastructure as Code. The candidate will demonstrate familiarity with using automation practices to support continuous and repeatable evaluation tasks.
Cloud Logging Fundamentals
The candidate will demonstrate familiarity with cloud logging capabilities and methods to collect logs in a way to facilitate utility and dissemination.
Cloud Networking Technology
The candidate will demonstrate knowledge of fundamental network security concepts and the implementation of these principles using cloud resources.
Containers and Cloud Storage
The candidate will demonstrate familiarity with serverless compute resources, container technologies, and how each can be orchestrated to achieve elasticity. The candidate will demonstrate familiarity with cloud storage options and how to architect these resources securely.
Discovering and Storing Sensitive Data
The candidate will demonstrate an understanding of data security considerations in a multi-tenant environment and how to configure and monitor cloud resources to deter data leakage using encryption and data loss prevent strategies.
External access and IAM Best Practices
The candidate will demonstrate an understanding of the security considerations when integrating 3rd party services with a cloud environment and the proper steps to evaluate the resiliency of the integration configuration.
Frameworks for Built-in Security
The candidate will demonstrate an understanding of system development life cycles and AppSec frameworks to create a baseline configuration with security built-in. The candidate will demonstrate familiarity with continuous integration and continuous deployment.
Government and Legal Considerations
The candidate will demonstrate knowledge of considerations for government cloud adoption and geopolitical concerns with using cloud technology. The candidate will demonstrate a foundational understanding of cloud service agreements, contractual obligations, and legal considerations when using cloud resources.
Network Security Monitoring in the Cloud
The candidate will demonstrate basic knowledge of the collection and interpretation of network flow data and packet capturing using cloud resources. The candidate will demonstrate familiarity with using network security monitoring practices to enhance detection and response capabilities in the cloud.
Risk Management and Compliance
The candidate will demonstrate an understanding of regulatory, compliance, security assurance, and risk management requirements and the best practices and frameworks for addressing these considerations.
The candidate will demonstrate knowledge of the responsibilities and capabilities to securing user secrets. The candidate will demonstrate familiarity of the integration process for a variety of authentication mechanisms in a cloud environment.
Secure Compute Deployment
The candidate will demonstrate fundamental knowledge of resource allocation and image evaluation when deploying cloud compute resources. The candidate will demonstrate the ability to maintain the compute resource attack surface through automation practices and patch management.
Securing Cloud Networks
The candidate will demonstrate an understanding of network isolation and remote access. The candidate will demonstrate fundamental knowledge of common attacks against cloud resources and best practices to protect against them.
Understanding Shared Responsibility and Threat Informed Defense
The candidate will demonstrate basic knowledge of using the practice of threat modeling to architect threat informed defenses for cloud resources. The candidate will demonstrate an understanding of the various service delivery models and shared responsibility for each when using a public cloud service.
Using Sensitive Data
The candidate will demonstrate an understanding of cloud resource elasticity and high availability functionality. The candidate will demonstrate fundamental knowledge of securing data in transit between cloud resources and application users.
The Virtual Classroom is an online forum, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.
Your prereading sits in your personal space at readynez.com: My Readynez. Simply log in, find your course and start your preparations.
Your exam voucher is usually included in your virtual training package. When you´re ready to sit your exam, you just book it. You can sit most exams from home or at a local test centre. We’re here to help you with that process.