There are a multitude of certifications an individual can pursue after taking the Cloud Security Essentials course. For entry-level or transitioning talent, CompTIA’s Security+ is the perfect introductory cybersecurity certification and Cloud+ for a direct career track in cloud computing. For individuals who are interested in training for a particular cloud provider, click here to see vendor-specific cloud certification training options.
As a true foundational curriculum, the Cloud Security Essentials course spans six major units on security controls, systems, and platforms for secure cloud system deployment and implementation. Click on the sections below to see the expanded topic areas within each unit.
Unit 1: Cloud Concepts and Resource Security –This unit covers basic cloud concepts, resource types, policy types, and cloud configurations.
- Identify Different Cloud Resource Types
- Cloud Policy Types and Configurations
Unit 2: Cloud Access Management – This unit covers cloud IAM (Identity and Access Management) concepts, cloud segmentation, and further role-based controls.
- Cloud Resource Segmentation
- Role-Based Controls
Unit 3: Secure Cloud Storage – This unit covers storage types, access controls (with a focus on encryption), and configuration mechanisms.
- Cloud Storage Types
- Access and Encryption Controls
- Access and Configuration Mechanisms
Unit 4: Secure Virtual Networks – This unit covers secure communication configurations, endpoint protection mechanisms, and firewalls, and virtual security appliances.
- Secure Communication Configuration
- Secure Endpoint Protection Mechanisms
- Firewalls and Virtual Security Appliances
Unit 5: Secure Cloud Applications – This unit covers cloud development environments, secure deployment configurations, and monitoring services configuration.
- Cloud Development Environment for Coding and Automation
- Configure Secure Deployment and Access Mechanisms
- Configure Monitoring Services
Unit 6: Cloud Governance and Compliance – This unit covers security governance configuration, legal and regulatory compliance, and legal requirements for forensic data collection.
- Security Governance Configuration and Migration
- Legal and Regulatory Compliance
- Legal Requirements for Forensic Data Collection