Cloud Security, Resiliency, and Vulnerability Management

Instructor: Packt - Course Instructors

Intermediate Level • 7 hours to complete 3 weeks at 2 hours a week • Flexible Schedule

What You'll Learn

  • Implement cloud security best practices, including identity management and Zero Trust models.
  • Develop resilient security strategies, including redundancy, backup planning, and defense-in-depth.
  • Identify and mitigate vulnerabilities, including XSS, SQL injection, and misconfigurations.
  • Secure endpoints, monitor network activity, and apply security benchmarks effectively.

Skills You'll Gain

Zero Trust Network Access
Network Security
Infrastructure as Code (IaC)
Vulnerability Assessments
Security Controls
Hardening
Cloud Security
Cyber Threat Intelligence
Threat Detection
Mobile Security
Cybersecurity
Disaster Recovery
Vulnerability Management
Cloud Computing Architecture
Authentications
Cloud Computing
Endpoint Security
Cyber Security Assessment

Shareable Certificate

Earn a shareable certificate to add to your LinkedIn profile

Outcomes

  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 5 modules in this course

In this module, we will explore secure cloud network architecture, examining deployment models, security solutions, and automation strategies. We will also dive into Zero Trust principles, Infrastructure as Code, and the security challenges of embedded systems, IoT, and Industrial Control Systems.

In this module, we will examine key resiliency and site security strategies, including backup methods, cybersecurity resilience, and redundancy planning. We will also explore defense-in-depth techniques and physical security controls to safeguard critical infrastructure.

In this module, we will dive into vulnerability management, covering techniques for discovery, analysis, and remediation. We will explore common attack methods, weak configurations, and the role of threat intelligence in proactive security.

In this module, we will evaluate network security capabilities, covering secure configurations, Wi-Fi authentication, and monitoring strategies. We will also explore web filtering techniques to enhance security and enforce compliance.

In this module, we will explore endpoint security strategies, including device protection, segmentation, and mobile security management. We will also discuss secure design principles to ensure robust security across endpoints and applications.