Cloud Security Practitioner

ethical hacking
ML FastTrack5
  • 0 student
  • 0 lessons
  • 0 quizzes
  • 10 week duration
0 student

Every organization is migrating to the cloud in order to save money, but is it really safe?

In this course, you will learn the fundamentals of cloud-based service technologies, as well as how to best secure them. This course is designed for anyone who is new to cloud computing that needs to understand the basics of security and how they are implemented inside a cloud computing platform. Many IT Professionals as well as Career Starters have taken up the course and for those who passed, almost all are gainfully employed with successful careers, but the landscape is changing.

Cloud Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability.

So, if you have ever wanted to learn the basics of cloud security, setting up your own cloud architecture, this is the course for you!

Target Audience

Students, System Administrators, Network Administrators and Engineers, Web managers, Auditors, Security Professionals in general, any working professional from non-IT background with basic computer knowledge willing to change their career.


  • 45 days
  • 2 hrs a day
  • 5 days a week
  • 90 hrs


Before getting into this course you should either have passed ethical hacker v 1.0, or have an equivalent certification

Training and Certification

We have offline classroom as well as online training procedure where each and every topic is explained thoroughly. There would be weekly exams and daily quizzes to asses the student’s progress. After the training period students have to write blogs and sit for the examination which would live as well as theory exam. After passing the examination Analogica will help the student to build his/her resume and will work on portfolio making.


  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Cloud security compliance
  • OSI model and its migration
  • Functionality of TCP/IP model
  • Mitre Attack
  • Service as a service
  • Product as a Service
  • Virtualization methodologies
  • Cloud deployment model
  • Benefits of using cloud
  • NIST definition of cloud computing
  • Cloud Security Assurance
  • Cloud vulnerability analysis
  • How to be a secure cloud user
  • Professional auditing procedures


  • Introduction to Cloud Security
    No items in this section
  • Principals of threat based security
    No items in this section
  • OSI and TCP/IP model
    No items in this section
  • Web application structure
    No items in this section
  • Cloud essential characteristics and service models
    No items in this section
  • DOS and DDOS attacks
    No items in this section
  • Cloud risk and concerns 1-4
    No items in this section
  • Cloud Security assurance ( CSA )
    No items in this section
  • CSA notorious nine
    No items in this section
  • Countermeasures
    No items in this section
User Avatar
Fardeen Ahmed is one of those rare talents in cyber security domain , who is serious about creating awareness about possible cyber security threats for data centric software companies across Bangalore and Karnataka. His Certifications and engagements with industry and educational institutions speaks volumes about his conviction. He keeps himself abreast with cutting edge technologies , a fact which is further substantiated by the fact that he is certified by EC Council , United States, which is the only recognized certifying body of knowledge for the world. He is right in asserting that the next wars are fought against economy of the countries and not against the people of a particular country. Cyber security is window to steal the information using which economies can be slowed down. With the fast moving pace of India's digitalization, Fardeen is quiet certain that india will see a sudden demand for expert cyber security analysts. With that in mind, he has created a foundation course taught over the period of 3 days to recognize the hidden gems who could take up the mantle of ethical cyber skills. He is well versed with penetration testing and python programming. Not to forget his expertise in internet of things and IOT security which again is the main problem area when smart city projects are implemented throughout India. His presence adds value to our clients trust and the students who come under his mentorship.

0.00 average based on 0 ratings

5 Star
4 Star
3 Star
2 Star
1 Star