Cloud Security For It Professionals
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 427.02 MB | Duration: 2h 25m
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 427.02 MB | Duration: 2h 25m
Introduction to Cloud Security with AWS: Concepts, Tools & Best Practices
What you'll learn
Cloud Computing
Identity & Access Management (IAM) in Cloud
Network Security
Data Protection
Application Security
Threat Detection
Logging and Monitoring
Requirements
Enthusiastic about learning about learning Cloud Security
Description
In today’s digital landscape, organizations are rapidly migrating to cloud platforms, but with that comes new and evolving security challenges. Cloud Security for IT Professionals is designed to equip IT professionals, students, and career changers with the essential knowledge and skills to secure cloud environments effectively.This course offers a practical, vendor-neutral approach while also referencing leading platforms like AWS, Azure, and Google Cloud. You will learn the core principles of cloud security, including identity and access management (IAM), data protection, network security, application security, threat detection, logging and monitoring, and the shared responsibility model.What Will You Learn?Understand key cloud security concepts and the shared responsibility modelConfigure access control using IAM, RBAC, and ABACSecuring network traffic through virtual private cloud (VPC)Apply encryption techniques and secure sensitive dataImplement logging, monitoring, and threat detection strategiesIdentify common cloud security threats and how to mitigate themExplore tools and services across AWSAlign cloud security practices with compliance and audit requirementsWho Should Enroll:IT auditors, compliance analysts, and GRC specialistsDevelopers and engineers responsible for securing cloud deploymentsAnyone preparing for cloud or security certifications (e.g., CCSP, AWS Security Specialty)By the end of this course, you’ll have a solid foundation to confidently secure cloud environments and understand the risks and responsibilities involved. Whether you’re starting a new role or enhancing your current skill set, this course will give you the clarity and confidence to work securely in the cloud.
Overview
Section 1: Introduction to Cloud Computing
Lecture 1 Understanding Cloud Computing
Lecture 2 On-Premise Model
Lecture 3 Cloud Computing Model
Lecture 4 Benefits of Cloud Computing
Lecture 5 Data Centres
Lecture 6 What is a Server
Lecture 7 Services Provided by Servers
Lecture 8 Deployment Models
Lecture 9 Service Models
Lecture 10 Key Services in Cloud Eco System
Lecture 11 Introduction to Virtual Machines
Lecture 12 What are Containers
Lecture 13 Understanding Serverless Computing
Section 2: Cloud Security
Lecture 14 Introduction to Cloud Security
Lecture 15 Identity and Access Management (IAM)
Lecture 16 Create AWS Account
Lecture 17 IAM Users
Lecture 18 IAM Groups
Lecture 19 IAM Roles
Lecture 20 IAM Policy
Lecture 21 Access Control Models: RBAC vs ABAC
Section 3: Data Protection
Lecture 22 Introduction to Data Protection
Lecture 23 Data Segmentation
Lecture 24 Data Encryption
Lecture 25 Key Management
Lecture 26 Secrets Management
Lecture 27 Data Loss Prevention
Section 4: Network Security
Lecture 28 Securing Network Boundaries
Lecture 29 Virtual Private Cloud (VPC)
Lecture 30 Network Firewalls
Lecture 31 Security Groups
Section 5: Application Security
Lecture 32 Introduction to Application Security
Lecture 33 Secure Code Practices
Lecture 34 Functional Application Tests
Lecture 35 Static Application Security Test (SAST)
Section 6: Logging and Monitoring
Lecture 36 Introduction to Logging and Monitoring
Lecture 37 Log Events in Cloud
Lecture 38 Logging Pipeline
Lecture 39 CloudTrail and CloudWatch Integration
Lecture 40 Configuring Logging Pipelines I
Lecture 41 Configuring Logging Pipelines II
Section 7: Threat Detection in Cloud
Lecture 42 Introduction to Threat Detection
Lecture 43 Types of Threats in Cloud Environment
Lecture 44 Security Information and Event Management (SIEM)
Lecture 45 Cloud Security Best Practices
Aspiring cloud or cybersecurity professionals,Developers and engineers responsible for securing cloud deployments,IT auditors, compliance analysts, and GRC specialists,Anyone preparing for cloud or security certifications