Cloud Security For It Professionals

Posted By: ELK1nG

Cloud Security For It Professionals
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 427.02 MB | Duration: 2h 25m

Introduction to Cloud Security with AWS: Concepts, Tools & Best Practices

What you'll learn

Cloud Computing

Identity & Access Management (IAM) in Cloud

Network Security

Data Protection

Application Security

Threat Detection

Logging and Monitoring

Requirements

Enthusiastic about learning about learning Cloud Security

Description

In today’s digital landscape, organizations are rapidly migrating to cloud platforms, but with that comes new and evolving security challenges. Cloud Security for IT Professionals is designed to equip IT professionals, students, and career changers with the essential knowledge and skills to secure cloud environments effectively.This course offers a practical, vendor-neutral approach while also referencing leading platforms like AWS, Azure, and Google Cloud. You will learn the core principles of cloud security, including identity and access management (IAM), data protection, network security, application security, threat detection, logging and monitoring, and the shared responsibility model.What Will You Learn?Understand key cloud security concepts and the shared responsibility modelConfigure access control using IAM, RBAC, and ABACSecuring network traffic through virtual private cloud (VPC)Apply encryption techniques and secure sensitive dataImplement logging, monitoring, and threat detection strategiesIdentify common cloud security threats and how to mitigate themExplore tools and services across AWSAlign cloud security practices with compliance and audit requirementsWho Should Enroll:IT auditors, compliance analysts, and GRC specialistsDevelopers and engineers responsible for securing cloud deploymentsAnyone preparing for cloud or security certifications (e.g., CCSP, AWS Security Specialty)By the end of this course, you’ll have a solid foundation to confidently secure cloud environments and understand the risks and responsibilities involved. Whether you’re starting a new role or enhancing your current skill set, this course will give you the clarity and confidence to work securely in the cloud.

Overview

Section 1: Introduction to Cloud Computing

Lecture 1 Understanding Cloud Computing

Lecture 2 On-Premise Model

Lecture 3 Cloud Computing Model

Lecture 4 Benefits of Cloud Computing

Lecture 5 Data Centres

Lecture 6 What is a Server

Lecture 7 Services Provided by Servers

Lecture 8 Deployment Models

Lecture 9 Service Models

Lecture 10 Key Services in Cloud Eco System

Lecture 11 Introduction to Virtual Machines

Lecture 12 What are Containers

Lecture 13 Understanding Serverless Computing

Section 2: Cloud Security

Lecture 14 Introduction to Cloud Security

Lecture 15 Identity and Access Management (IAM)

Lecture 16 Create AWS Account

Lecture 17 IAM Users

Lecture 18 IAM Groups

Lecture 19 IAM Roles

Lecture 20 IAM Policy

Lecture 21 Access Control Models: RBAC vs ABAC

Section 3: Data Protection

Lecture 22 Introduction to Data Protection

Lecture 23 Data Segmentation

Lecture 24 Data Encryption

Lecture 25 Key Management

Lecture 26 Secrets Management

Lecture 27 Data Loss Prevention

Section 4: Network Security

Lecture 28 Securing Network Boundaries

Lecture 29 Virtual Private Cloud (VPC)

Lecture 30 Network Firewalls

Lecture 31 Security Groups

Section 5: Application Security

Lecture 32 Introduction to Application Security

Lecture 33 Secure Code Practices

Lecture 34 Functional Application Tests

Lecture 35 Static Application Security Test (SAST)

Section 6: Logging and Monitoring

Lecture 36 Introduction to Logging and Monitoring

Lecture 37 Log Events in Cloud

Lecture 38 Logging Pipeline

Lecture 39 CloudTrail and CloudWatch Integration

Lecture 40 Configuring Logging Pipelines I

Lecture 41 Configuring Logging Pipelines II

Section 7: Threat Detection in Cloud

Lecture 42 Introduction to Threat Detection

Lecture 43 Types of Threats in Cloud Environment

Lecture 44 Security Information and Event Management (SIEM)

Lecture 45 Cloud Security Best Practices

Aspiring cloud or cybersecurity professionals,Developers and engineers responsible for securing cloud deployments,IT auditors, compliance analysts, and GRC specialists,Anyone preparing for cloud or security certifications