SlideShare a Scribd company logo
1 of 12
Download to read offline
@infosectrain SWIPE FOR COURSE CONTENT
CLOUD SECURITY
PRACTITIONER TRAINING
40 hrs of instructor-led training
Access to the recorded sessions
Certified & Experienced Instructors
Training Certificate
******
*****
LOGIN
PASSWORD
USD 299
EARLY BIRD OFFER
INR 5,999 TAXES
+
INR 19,999
USD 99
SPEAKER
Rishabh
MCT | AZ 104 | AZ 500 | AZ 303 | AZ 304 |
SC 200 | CEH | ECIH | CND | CEI | Security+
| CSA | CCSE
10+ Years Experienced
@infosectrain SWIPE
MODULE 01
CLOUD BASICS AND MODELS
COURSE CONTENT
Topics:
 Evolution of infrastructure technology
 Virtualization and Hypervisor.
 Introduction and Benefit of the cloud
 Shared model of cloud
 Service provided by cloud
 Challenges in cloud
Exercise:
 Create Azure Free Account
 Create AWS Account
@infosectrain SWIPE
MODULE 02
DEPLOY AND UNDERSTAND COMPUTE AND CONFIGURATION
Topics:
 Secure Instance / Virtual Machine Deployment
 Host Configuration Management
 Manage Host Configuration
 Type of Cloud Storage: Disk for Compute
 Application Security
 Threat Modelling overview
 Platform as a Service (PaaS)
 Container and Kubernetes
Exercise:
 Deploy a Virtual Machine.
 Discuss disk option, image option.
 Snapshot of Disk
 Deploy Web App.
 Deploy the Container.
@infosectrain SWIPE
MODULE 03
CONTROL YOUR IDENTITY AND ACCESS MANAGEMENT
Topics:
 Lifecycle for Identity and Access Management
 Concept of Cloud Account and Least privileges: Policies and 
 Permissions, Groups and Roles, Temporary Credentials
 Secrets Management
 Customer Account Management and External Access
 Security Loopholes in Cloud IAM Services
 More IAM Best Practices
Exercise:
 Create a cloud-based identity
 Apply roles to the account
 Create group
 Assign role
 Enable MFA
 Different Security option and Service
 Identity Audit with Identity governance feature in Azure
@infosectrain SWIPE
MODULE 04
DEPLOY AND MONITOR NETWORK RESOURCES
Topics:
 Cloud Virtual Networking
 Network Segmentation
 Log Collection and Analysis
 Traffic Analysis of Cloud network
 Network Protection Services: Service Endpoints and Private Endpoints
 Restricting Access to Network via JIT
 Cloud Logging Services
 Infrastructure as Code
Exercise:
 Deploy Virtual Network
 Allow Administrative Access
 Jump Server and Bastion Host
 VPN
 Troubleshoot the virtual Network.
 Enable logging option
 Deploy Network and VM using json.
@infosectrain SWIPE
MODULE 05
ENCRYPT AND PROTECT DATA
Topics:
 Lifecycle Management
 Storage Account
 Data Identification and Classification
 Cloud Service Encryption: Data at Rest Encryption, Data in Transit
Encryption, Disk Level Encryption
 Data Asset Management
 Cloud Access Security Brokers (CASB)
Exercise:
 Deploy storage account with availability option
 Encryption option
 Encryption option for disk storage
 Deploy SQL Server
 Data classification and Identification
 Data Masking
 Data Encryption option
@infosectrain SWIPE
MODULE 06
DETECTING AND HANDLING CLOUD INCIDENTS
WITH SECURITY OPERATION
Topics:
 Understand Cloud Incident Response Lifecycle: Discuss Each Phase
 Understand How SOAR Accelerates Incident Response
 Security As a Service
 Cloud Based SIEM Models
Exercise:
 Creating alert using azure monitor service.
 Microsoft Defender for Cloud
 AWS Cloud Trail
 AWS Cloud Watch and SNS
 Microsoft Sentinel
@infosectrain SWIPE
MODULE 07
BASICS OF PENETRATION TESTING AND FORENSIC IN CLOUD
Topics:
 Pen Testing in Cloud
 Scope of Cloud Pen Test
 Common Steps of Pen Testing
 Cloud Forensics
 Cloud Forensics Challenges
Exercise:
 Examine Logs on Cloud
 Identify Misconfigured S3 Bucket and Publicly accessible data
@infosectrain SWIPE
MODULE 08
MANAGE BUSINESS CONTINUITY AND DISASTER RECOVERY
Topics:
 Discuss Cloud Disaster Recovery and Business Continuity
 Main Element of BC/DR in cloud
 Learn to Design Disaster Recovery and Business Continuity in Cloud
Exercise:
 Implementing Backup for VM
 Implementing DR for storage account
@infosectrain SWIPE
MODULE 09
HANDLING LEGAL ISSUE AND POLICY IN CLOUD
Topics:
 Understand the laws impacting cloud computing
 Learn the cloud computing standards
 Describe the legal frameworks for data protection and privacy
 Learn audit planning and reporting in the cloud
 Describe outsourcing and vendor management
Exercise:
 Auditing Compliance of Azure Resources by creating Policy Assignments
with Azure Policy
 Conducting Security Audit in AWS with AWS Trusted Advisor
@infosectrain SWIPE
MODULE 10
MANAGE GRC FOR THE CLOUD
Topics:
 Understand GRC in the cloud
 Discuss cloud governance
 Learn to implement and maintain governance for cloud computing
 Discuss risk management in the cloud
 Understand risk management framework and process in the cloud
 Understand cloud compliance
 Learn to implement GRC in the cloud
Exercise:
 Deploying Policy for the restriction of deployment
 Enforce Compliance by Assigning In-built Policy and Creating Custom
Policy in Azure
CLOUD SECURITY
PRACTITIONER TRAINING
www.infosectrain.com | sales@infosectrain.com
ENROLL NOW
BECOME AN EXPERT IN

More Related Content

Similar to Cloud Security Practitioner Training.pdf

Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Amaaira Johns
ย 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protectionDatabarracks
ย 
Breaking The Cloud Kill Chain
Breaking The Cloud Kill ChainBreaking The Cloud Kill Chain
Breaking The Cloud Kill ChainPuma Security, LLC
ย 
Azure governance v4.0
Azure governance v4.0Azure governance v4.0
Azure governance v4.0Marcos Oikawa
ย 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
ย 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
ย 
AWS CSA Associate 06-07
AWS CSA Associate 06-07AWS CSA Associate 06-07
AWS CSA Associate 06-07Heitor Vital
ย 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
ย 
AWS-Course-content-apponix.pdf
AWS-Course-content-apponix.pdfAWS-Course-content-apponix.pdf
AWS-Course-content-apponix.pdfPrajeeshKrishnan
ย 
Create Secure Test and Dev Environments in the Cloud
Create Secure Test and Dev Environments in the CloudCreate Secure Test and Dev Environments in the Cloud
Create Secure Test and Dev Environments in the CloudRightScale
ย 
Aws training-course-content
Aws training-course-contentAws training-course-content
Aws training-course-contentTraining Institute
ย 
CyberArk_Certification_Training_Course_Content
CyberArk_Certification_Training_Course_ContentCyberArk_Certification_Training_Course_Content
CyberArk_Certification_Training_Course_Contentpriyanshamadhwal2
ย 
AZ-104T00A-ENU-PowerPoint_00.pptx
AZ-104T00A-ENU-PowerPoint_00.pptxAZ-104T00A-ENU-PowerPoint_00.pptx
AZ-104T00A-ENU-PowerPoint_00.pptxAliChallioui
ย 
Multi-Cloud with Nomad and Consul Connect
Multi-Cloud with Nomad and Consul ConnectMulti-Cloud with Nomad and Consul Connect
Multi-Cloud with Nomad and Consul ConnectMitchell Pronschinske
ย 
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...Certified Kubernetes Application Developer (CKAD) Online Training Certificati...
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...Multisoft Virtual Acedamy
ย 
Certified Kubernetes Application Developer (CKAD) Online Training Certification
Certified Kubernetes Application Developer (CKAD) Online Training CertificationCertified Kubernetes Application Developer (CKAD) Online Training Certification
Certified Kubernetes Application Developer (CKAD) Online Training CertificationMultisoft Virtual Acedamy
ย 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
ย 
CLOUD_COMPUTING_AWS_TRAINING.pptx
CLOUD_COMPUTING_AWS_TRAINING.pptxCLOUD_COMPUTING_AWS_TRAINING.pptx
CLOUD_COMPUTING_AWS_TRAINING.pptxMohammadSamiuddin10
ย 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...Faiza Mehar
ย 
Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)GICTTraining
ย 

Similar to Cloud Security Practitioner Training.pdf (20)

Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
ย 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
ย 
Breaking The Cloud Kill Chain
Breaking The Cloud Kill ChainBreaking The Cloud Kill Chain
Breaking The Cloud Kill Chain
ย 
Azure governance v4.0
Azure governance v4.0Azure governance v4.0
Azure governance v4.0
ย 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
ย 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
ย 
AWS CSA Associate 06-07
AWS CSA Associate 06-07AWS CSA Associate 06-07
AWS CSA Associate 06-07
ย 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
ย 
AWS-Course-content-apponix.pdf
AWS-Course-content-apponix.pdfAWS-Course-content-apponix.pdf
AWS-Course-content-apponix.pdf
ย 
Create Secure Test and Dev Environments in the Cloud
Create Secure Test and Dev Environments in the CloudCreate Secure Test and Dev Environments in the Cloud
Create Secure Test and Dev Environments in the Cloud
ย 
Aws training-course-content
Aws training-course-contentAws training-course-content
Aws training-course-content
ย 
CyberArk_Certification_Training_Course_Content
CyberArk_Certification_Training_Course_ContentCyberArk_Certification_Training_Course_Content
CyberArk_Certification_Training_Course_Content
ย 
AZ-104T00A-ENU-PowerPoint_00.pptx
AZ-104T00A-ENU-PowerPoint_00.pptxAZ-104T00A-ENU-PowerPoint_00.pptx
AZ-104T00A-ENU-PowerPoint_00.pptx
ย 
Multi-Cloud with Nomad and Consul Connect
Multi-Cloud with Nomad and Consul ConnectMulti-Cloud with Nomad and Consul Connect
Multi-Cloud with Nomad and Consul Connect
ย 
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...Certified Kubernetes Application Developer (CKAD) Online Training Certificati...
Certified Kubernetes Application Developer (CKAD) Online Training Certificati...
ย 
Certified Kubernetes Application Developer (CKAD) Online Training Certification
Certified Kubernetes Application Developer (CKAD) Online Training CertificationCertified Kubernetes Application Developer (CKAD) Online Training Certification
Certified Kubernetes Application Developer (CKAD) Online Training Certification
ย 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
ย 
CLOUD_COMPUTING_AWS_TRAINING.pptx
CLOUD_COMPUTING_AWS_TRAINING.pptxCLOUD_COMPUTING_AWS_TRAINING.pptx
CLOUD_COMPUTING_AWS_TRAINING.pptx
ย 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
ย 
Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)
ย 

More from infosec train

Azure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdfAzure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdfinfosec train
ย 
SOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrainSOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTraininfosec train
ย 
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdfCISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdfinfosec train
ย 
CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfinfosec train
ย 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTraininfosec train
ย 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTraininfosec train
ย 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTraininfosec train
ย 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTraininfosec train
ย 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectraininfosec train
ย 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfinfosec train
ย 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfinfosec train
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdfinfosec train
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfinfosec train
ย 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdfinfosec train
ย 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdfinfosec train
ย 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01infosec train
ย 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdfinfosec train
ย 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTraininfosec train
ย 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfinfosec train
ย 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfinfosec train
ย 

More from infosec train (20)

Azure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdfAzure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdf
ย 
SOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrainSOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrain
ย 
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdfCISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
ย 
CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdf
ย 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
ย 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrain
ย 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrain
ย 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTrain
ย 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrain
ย 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
ย 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdf
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
ย 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdf
ย 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdf
ย 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01
ย 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
ย 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
ย 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
ย 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdf
ย 

Recently uploaded

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
ย 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
ย 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
ย 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
ย 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
ย 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
ย 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
ย 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
ย 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
ย 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
ย 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
ย 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
ย 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
ย 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
ย 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
ย 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
ย 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
ย 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
ย 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
ย 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
ย 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
ย 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
ย 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
ย 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
ย 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
ย 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
ย 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
ย 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
ย 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
ย 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
ย 

Cloud Security Practitioner Training.pdf

  • 1. @infosectrain SWIPE FOR COURSE CONTENT CLOUD SECURITY PRACTITIONER TRAINING 40 hrs of instructor-led training Access to the recorded sessions Certified & Experienced Instructors Training Certificate ****** ***** LOGIN PASSWORD USD 299 EARLY BIRD OFFER INR 5,999 TAXES + INR 19,999 USD 99 SPEAKER Rishabh MCT | AZ 104 | AZ 500 | AZ 303 | AZ 304 | SC 200 | CEH | ECIH | CND | CEI | Security+ | CSA | CCSE 10+ Years Experienced
  • 2. @infosectrain SWIPE MODULE 01 CLOUD BASICS AND MODELS COURSE CONTENT Topics: Evolution of infrastructure technology Virtualization and Hypervisor. Introduction and Benefit of the cloud Shared model of cloud Service provided by cloud Challenges in cloud Exercise: Create Azure Free Account Create AWS Account
  • 3. @infosectrain SWIPE MODULE 02 DEPLOY AND UNDERSTAND COMPUTE AND CONFIGURATION Topics: Secure Instance / Virtual Machine Deployment Host Configuration Management Manage Host Configuration Type of Cloud Storage: Disk for Compute Application Security Threat Modelling overview Platform as a Service (PaaS) Container and Kubernetes Exercise: Deploy a Virtual Machine. Discuss disk option, image option. Snapshot of Disk Deploy Web App. Deploy the Container.
  • 4. @infosectrain SWIPE MODULE 03 CONTROL YOUR IDENTITY AND ACCESS MANAGEMENT Topics: Lifecycle for Identity and Access Management Concept of Cloud Account and Least privileges: Policies and Permissions, Groups and Roles, Temporary Credentials Secrets Management Customer Account Management and External Access Security Loopholes in Cloud IAM Services More IAM Best Practices Exercise: Create a cloud-based identity Apply roles to the account Create group Assign role Enable MFA Different Security option and Service Identity Audit with Identity governance feature in Azure
  • 5. @infosectrain SWIPE MODULE 04 DEPLOY AND MONITOR NETWORK RESOURCES Topics: Cloud Virtual Networking Network Segmentation Log Collection and Analysis Traffic Analysis of Cloud network Network Protection Services: Service Endpoints and Private Endpoints Restricting Access to Network via JIT Cloud Logging Services Infrastructure as Code Exercise: Deploy Virtual Network Allow Administrative Access Jump Server and Bastion Host VPN Troubleshoot the virtual Network. Enable logging option Deploy Network and VM using json.
  • 6. @infosectrain SWIPE MODULE 05 ENCRYPT AND PROTECT DATA Topics: Lifecycle Management Storage Account Data Identification and Classification Cloud Service Encryption: Data at Rest Encryption, Data in Transit Encryption, Disk Level Encryption Data Asset Management Cloud Access Security Brokers (CASB) Exercise: Deploy storage account with availability option Encryption option Encryption option for disk storage Deploy SQL Server Data classification and Identification Data Masking Data Encryption option
  • 7. @infosectrain SWIPE MODULE 06 DETECTING AND HANDLING CLOUD INCIDENTS WITH SECURITY OPERATION Topics: Understand Cloud Incident Response Lifecycle: Discuss Each Phase Understand How SOAR Accelerates Incident Response Security As a Service Cloud Based SIEM Models Exercise: Creating alert using azure monitor service. Microsoft Defender for Cloud AWS Cloud Trail AWS Cloud Watch and SNS Microsoft Sentinel
  • 8. @infosectrain SWIPE MODULE 07 BASICS OF PENETRATION TESTING AND FORENSIC IN CLOUD Topics: Pen Testing in Cloud Scope of Cloud Pen Test Common Steps of Pen Testing Cloud Forensics Cloud Forensics Challenges Exercise: Examine Logs on Cloud Identify Misconfigured S3 Bucket and Publicly accessible data
  • 9. @infosectrain SWIPE MODULE 08 MANAGE BUSINESS CONTINUITY AND DISASTER RECOVERY Topics: Discuss Cloud Disaster Recovery and Business Continuity Main Element of BC/DR in cloud Learn to Design Disaster Recovery and Business Continuity in Cloud Exercise: Implementing Backup for VM Implementing DR for storage account
  • 10. @infosectrain SWIPE MODULE 09 HANDLING LEGAL ISSUE AND POLICY IN CLOUD Topics: Understand the laws impacting cloud computing Learn the cloud computing standards Describe the legal frameworks for data protection and privacy Learn audit planning and reporting in the cloud Describe outsourcing and vendor management Exercise: Auditing Compliance of Azure Resources by creating Policy Assignments with Azure Policy Conducting Security Audit in AWS with AWS Trusted Advisor
  • 11. @infosectrain SWIPE MODULE 10 MANAGE GRC FOR THE CLOUD Topics: Understand GRC in the cloud Discuss cloud governance Learn to implement and maintain governance for cloud computing Discuss risk management in the cloud Understand risk management framework and process in the cloud Understand cloud compliance Learn to implement GRC in the cloud Exercise: Deploying Policy for the restriction of deployment Enforce Compliance by Assigning In-built Policy and Creating Custom Policy in Azure
  • 12. CLOUD SECURITY PRACTITIONER TRAINING www.infosectrain.com | sales@infosectrain.com ENROLL NOW BECOME AN EXPERT IN