Training: Strengthening cloud security

Supported by Qualiopi

TRAINING PROGRAM

In the age of the ubiquitous Cloud, security is more crucial than ever. Let's tackle Cloud security: from acquiring the fundamentals to putting them into real practice, via an introduction to offensive security.

TRAINING OBJECTIVES

- Know the fundamentals of Cloud security

- Integrate security measures at the level of certain components

- Know the techniques and tools used by hackers

PROFILES OF BENEFICIARIES

- For whom: Technical managers, DevOps, DevSecOps, IT engineers, developers

- Prerequisites: Have internet access and a computer tool to follow the distance learning course

COURSE CONTENTS

- Cloud security principles - 1H

- Cloud Services Architecture and Models - 1H

- Data security - 1H

- Identity and access management - 1H

- Network security - 1H

- Cloud Security Supervision - 1H

- Offensive Security Exercise - 1H

- Infrastructure as Code Security - 1H

- Container Security - 1H

- Putting acquired knowledge into practice through a real-life case - 4H

- Learning summary - 1H

‍FOLLOW-UP AND ASSESSMENT OF RESULTS

- Attendancesheets

- Beneficiary self-assessment of pedagogical objectives prior to training to personalize pedagogical content

- Beneficiary self-assessment of pedagogical objectives at the end of training to assess progress

- Evaluation of the beneficiary's achievement of objectives by the trainer at the end of training

- Certificate of training completion handed out at the end of the course

‍TECHNICAL AND PEDAGOGICAL RESOURCES

- Practical
exercises , role-playing, applications

- Work in sub-groups, case studies, quizzes

QUALITY AND SATISFACTION

Trainee satisfaction / number of trainees

CAPACITY

Between 3 and 10 learners

ACCESSIBILITY

12 days

ACCESSIBILITY

Disabled situations will be considered on a case-by-case basis.