• Classroom
  • Online, Instructor-Led
Course Description

This is an intensive training program designed for cybersecurity professionals and IT managers seeking expertise in securing cloud environments. Covering fundamental concepts, advanced threat detection, and incident response strategies, the course provides a hands-on experience with leading cloud security tools and technologies. Participants will gain insights into securing data, applications, and cloud-native services through best practices. With a focus on practical skills development and real-world scenarios, this workshop equips individuals with the knowledge and confidence to navigate the evolving landscape of cloud-based cyber threats, ensuring a robust defense against potential security challenges.

Learning Objectives

  • Understand the fundamentals of cloud computing and its role in cyber operations.
  • Explore various cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid).
  • Learn how to assess and mitigate security risks associated with cloud environments.
  • Gain hands-on experience in deploying and managing virtual machines in a cloud infrastructure.
  • Explore identity and access management (IAM) principles specific to cloud platforms.
  • Understand the basics of networking in a cloud environment and implement secure communication protocols.
  • Learn techniques for monitoring and logging in cloud-based cyber operations.
  • Explore security best practices for containerized applications in the cloud.
  • Understand the role of automation and scripting in cloud cyber operations.
  • Develop skills in incident detection, response, and recovery in a cloud-based context.
  • Explore the legal and ethical considerations surrounding cloud cyber operations.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cyber Defense Analysis
  • All-Source Analysis
  • Data Administration
  • Exploitation Analysis