TRAINING PROGRAM
In the age of the ubiquitous Cloud, security is more crucial than ever. Let's tackle Cloud security: from acquiring the fundamentals to putting them into real practice, via an introduction to offensive security.
TRAINING OBJECTIVES
- Know the fundamentals of Cloud security
- Integrate security measures at the level of certain components
- Know the techniques and tools used by hackers
PROFILES OF BENEFICIARIES
- For whom: Technical managers, DevOps, DevSecOps, IT engineers, developers
- Prerequisites: Have internet access and a computer tool to follow the distance learning course
COURSE CONTENTS
- Cloud security principles - 1H
- Cloud Services Architecture and Models - 1H
- Data security - 1H
- Identity and access management - 1H
- Network security - 1H
- Cloud Security Supervision - 1H
- Offensive Security Exercise - 1H
- Infrastructure as Code Security - 1H
- Container Security - 1H
- Putting acquired knowledge into practice through a real-life case - 4H
- Learning summary - 1H
FOLLOW-UP AND ASSESSMENT OF RESULTS
- Attendancesheets
- Beneficiary self-assessment of pedagogical objectives prior to training to personalize pedagogical content
- Beneficiary self-assessment of pedagogical objectives at the end of training to assess progress
- Evaluation of the beneficiary's achievement of objectives by the trainer at the end of training
- Certificate of training completion handed out at the end of the course
TECHNICAL AND PEDAGOGICAL RESOURCES
- Practical exercises , role-playing, applications
- Work in sub-groups, case studies, quizzes
QUALITY AND SATISFACTION
Trainee satisfaction / number of trainees
CAPACITY
Between 3 and 10 learners
ACCESSIBILITY
12 days
ACCESSIBILITY
Disabled situations will be considered on a case-by-case basis.