- 0 student
- 0 lessons
- 0 quizzes
- 10 week duration
Every organization is migrating to the cloud in order to save money, but is it really safe?
In this course, you will learn the fundamentals of cloud-based service technologies, as well as how to best secure them. This course is designed for anyone who is new to cloud computing that needs to understand the basics of security and how they are implemented inside a cloud computing platform. Many IT Professionals as well as Career Starters have taken up the course and for those who passed, almost all are gainfully employed with successful careers, but the landscape is changing.
Cloud Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability.
So, if you have ever wanted to learn the basics of cloud security, setting up your own cloud architecture, this is the course for you!
Students, System Administrators, Network Administrators and Engineers, Web managers, Auditors, Security Professionals in general, any working professional from non-IT background with basic computer knowledge willing to change their career.
- 45 days
- 2 hrs a day
- 5 days a week
- 90 hrs
Before getting into this course you should either have passed ethical hacker v 1.0, or have an equivalent certification
Training and Certification
We have offline classroom as well as online training procedure where each and every topic is explained thoroughly. There would be weekly exams and daily quizzes to asses the student’s progress. After the training period students have to write blogs and sit for the examination which would live as well as theory exam. After passing the examination Analogica will help the student to build his/her resume and will work on portfolio making.
WHAT WILL YOU LEARN ?
- Key issues plaguing the information security world, incident management process, and penetration testing.
- Cloud security compliance
- OSI model and its migration
- Functionality of TCP/IP model
- Mitre Attack
- Service as a service
- Product as a Service
- Virtualization methodologies
- Cloud deployment model
- Benefits of using cloud
- NIST definition of cloud computing
- Cloud Security Assurance
- Cloud vulnerability analysis
- How to be a secure cloud user
- Professional auditing procedures
Introduction to Cloud Security
Principals of threat based security
OSI and TCP/IP model
Web application structure
Cloud essential characteristics and service models
DOS and DDOS attacks
Cloud risk and concerns 1-4
Cloud Security assurance ( CSA )
CSA notorious nine
0.00 average based on 0 ratings