Cloud Security Expert (SCS-C01, AZ – 500 & CCSP) Training

BY
Infosec Train

Ace the AZ-500, CCSP, and the AWS Certified Security exams with Infosec Train’s Cloud Security Expert online training programme.

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based

Course overview

The Cloud Security Expert certification course is a unique attempt by Infosec Train to help aspiring cloud security professionals develop essential expertise across various cloud platforms. You can use this curriculum to prepare for Azure Security Technologies, AWS Security Specialty, and CCSP certification tests. Moreover, the programme relieves the hassle of going through multiple training courses. You’ll receive preparation strategies for all three exams in a single package.

The Cloud Security Expert online course helps you gain comprehensive expertise in basic and advanced cloud security concepts. You’ll cover all the essential concepts and topics necessary to qualify for the certification exams. The training also provides an overall impression of the practical responsibilities and roles to strengthen your ability to address the tests’ performance-based questions.

The Cloud Security Expert programme features flexible training schedules, enabling you to learn at your own pace. Recordings are also provided to prevent you from falling behind. All the lectures are mentored by highly qualified and experienced professionals who will guide you throughout the preparation.

The highlights

  • Highly qualified and experienced trainers
  • Access to recorded classes
  • Features mixed approach for covering all exam topics
  • Flexible Training Schedules 
  • Career-oriented training 
  • Affordable course price

Program offerings

  • Online training
  • Corporate training
  • One-to-one mentorship
  • Recorded classes available
  • Flexible learning
  • Career-oriented programme
  • Mixed teaching approach

Course and certificate fees

certificate availability

Yes

certificate providing authority

Infosec Train

Who it is for

The Cloud Security Expert online training is ideal for:

  • Systems engineers
  • Security consultant
  • Enterprise solution architects
  • Security administrator
  • Systems architect
  • Security managers
  • Security engineer

Eligibility criteria

To enrol in the Cloud Security Expert training course, you need two years or more of IT work experience, with six months of experience in the security field. Also, it would be best if you had a skillset mapped to the role of SysOps Administrator Associate or AWS Certified Solutions Architect Associate. 

On top of that, you need proficiency in cloud security, cloud computing, AWS, Azure Cloud, networking, and visualization fundamentals.

The exam-related requirements are as follows - for the AZ-500 exam, you need to have an in-depth familiarity with automation, scripting, virtualization, networking, and Azure cloud products. The CCSP exam requires you to have a minimum work experience of 5 years, with one year of experience in one or more domains specified under CCSP certification. You must also have internships and part-time work experience in cloud security job roles.

Lastly, for the AWS Certified Security exam, you must know security controls for AWS workloads and have two years of work experience in the same. At least five years of IT security’s hands-on experience is also mandatory.

To receive the Cloud Security Expert certification, you need to get 700 out of 1000 in all three exams.

What you will learn

Knowledge of aws technology Knowledge of cloud computing

After completing the Cloud Security Expert syllabus, you will have:

  • In-depth familiarity with all examination topics in AZ-500 certification
  • Proficiency in all exam skills for CCSP certification exam
  • Knowledge of all domains in the AWS Specialty Certification aligned with the new syllabus
  • The ability to execute cloud security expertise and knowledge for solving real-world problems
  • Deep understanding of various techniques, methods, best practices, and protocols for cloud security

The syllabus

Module 1 (AWS Certified Security – Specialty)

Domain 1: Incident Response
  • Given an AWS abuse notice, evaluate the suspected compromised instance or exposed access keys.
  • Preparation stages for incident response
  • Mitigation steps to perform Incident response steps
  • Verify that the Incident Response Plan includes relevant AWS services
  • Evaluate suspected compromised credentials
  • Evaluate suspected compromised EC2 Instances
  • AWS Guard Duty
  • Evaluate the configuration of automated alerting, and execute possible remediation of security-related incidents and emerging issues.
Domain 2: Logging and Monitoring
  • Design, Implement & troubleshoot security monitoring, and alerting.
  • Design, Implement & troubleshoot a logging solution.
  • Continuous Security Monitoring
  • AWS Security Solutions for Visibility and Compliance
  • AWS Inspector
  • AWS Detective & Security Hub
  • AWS WAF and Shield
  • AWS Systems Manager
  • AWS CloudWatch, CloudTrail, and Config
  • AWS Athena
  • AWS Macie
  • S3 Events & VPC Flow Logs
Domain 3: Infrastructure Security
  • Design edge security on AWS.
  • Design and implement a secure network infrastructure.
  • Troubleshoot a secure network infrastructure
  • Design and implement host-based security
  • AWS CloudFront
  • Security groups & Network ACLs
  • IPS/IDS concepts in cloud
  • DDoS Mitigation
  • Network Segmentation
  • Bastion Hosts
  • Virtual Private Cloud (VPC)
  • VPC Endpoints
  • Compliance Frameworks
  • AWS lambda fundamentals
  • AWS Simple Email Service
  • AWS Route53 DNS
Domain 4: Identity and Access Management
  • Design and implement a scalable authorization and authentication system to access AWS resources.
  • Understand the Principle of Least Privilege
  • IAM Policies & Roles
  • IAM JSON Policy Elements
  • IAM Permission boundaries
  • Understanding Delegation, STS
  • Cross account policies & roles
  • Understanding Federation & SSO
  • AWS Directory services
  • AWS Organizations
  • S3 Security, Cross Account S3 access
  • S3 Versioning
  • AWS License manager
  • AWS Cognito
  • Troubleshoot an authorization and authentication system to access AWS resources.
Domain 5: Data Protection
  • Design and implement key management and use
  • Cryptography fundamentals
  • Cloud Hardware Security Module (HSM)
  • AWS Key Management Service (KMS)
  • Envelope Encryption
  • KMS Authentication and Access Control
  • CloudTrail and Encryption
  • EBS Architecture and Secure Data Wiping
  • S3 Encryption
  • Secrets Manager
  • AWS Certificate Manager
  • Load Balancer Security
  • Docker and container security fundamentals
  • AWS Glacier
  • Troubleshoot key management.
  • Design and implement a data encryption solution for data at rest and data in transit.

Module 2 (Mapped to Azure AZ-500)

Azure Cloud Fundamentals
  • Azure infrastructure: Regions, Availability Zones, Geographies
  • Azure Resource Groups, Tags & ARM
  • Azure Portal, Cloud Shell, Powershell, and CLI
  • Azure subscription
  • Billing and cost management
Azure Virtual Machines
  • Compile a checklist for creating an Azure Virtual Machine
  • Describe the options available to create and manage an Azure Virtual Machine
  • Availability management, Maintenance, and Downtime
  • Monitoring VMs
  • Creating VM with Powershell/Bash
  • Managing Linux Instances
  • Availability Sets, Fault Domain and Update Domain
  • VM Custom Script Extensions, DSC
  • VM Scale Sets, Types scaling
  • Azure Bastion Service
  • Deploying ARN Templates
  • Add Data Disks & NIC to VM
  • Resizing VMs
  • Azure disk encryption & Disk encryption on Windows
  • VM security best practices
  • Key vault for disk encryption
  • VM backup & restore
  • VM hardening in Security Center
Azure App Services
  • Introduction to Azure app services
  • App Service plans & sizing
  • Web apps and settings
  • Scalability
Containers & Security
  • Containerization concepts, Docker & Kubernetes overview
  • Azure Container Service (ACS)
  • Azure Kubernetes Service (AKS)
  • Create an AKS Cluster
  • Create a container registry
  • Run and application on Kubernetes
  • Securing the container registry
  • Container isolation for AKS
  • Container security in AKS & Container scanning
Azure Storage Services
  • Azure storage accounts overview
  • Access Keys and Shared Access Signature (SAS)
  • Storage Types, Standard & premium storage accounts
  • Create Storage Account
  • Azure Storage Explorer
  • Azure Blob Containers
  • Storage Performance Tiers
  • Blob Access Policies
  • Blob Storage Pricing
  • Azure Files
  • Files Vs. Blobs
  • Azure File Sync
  • Secure File Transfer
  • File Share Snapshots
  • Storage Security & Authorization Options
  • Storage Security, Encryption keys & Key Vault
  • Managing Permissions
  • Blob Public Access Level
  • RBAC Authentication for Storage
  • Log Analytics
  • AZ Copy
  • Azure Backup
  • Azure Import/Export
  • Azure CDN
Azure Virtual Network (Vnet)
  • Purpose of Virtual Networks
  • Creating a private network in Azure
  • Subnets
  • Azure Service Endpoints
  • Domain and Custom Domains
  • Azure DNS
  • DNS Delegation
  • Public and Private zones
  • Network Security Groups
  • Azure Load Balancing Services
  • Azure Application Gateway
  • Network Traffic Management & Network Routing
  • User-defined routes & Vnet peering
  • Gateway Transit
  • Virtual Network Gateway
  • Azure firewall
  • DDoS protection
Azure Active Directory
  • Azure AD overview
  • Create an Azure AD tenant
  • AD Identity protection
  • Conditional Access
  • Managing Users, Groups & Devices
  • Self Service Password Reset
  • AD Connect, Hybrid Identities & identity protection
  • SSO and MFA
  • Managing Role-Based Access Control
  • Service principals
  • App registration
Secure Access by using Azure AD (PIM and Tenant Security)
  • Privileged Identity Management overview
  • Monitor privileged access for Azure AD Privileged Identity Management (PIM)
  • Configure Access Reviews Assigning resource roles (RBAC)
  • PIM role activation
Governance and Role-based access control (RBAC)
  • RBAC overview
  • Implementing effective RBAC
  • Configure subscription and resource permissions
  • Configure resource group permissions
  • Configure custom RBAC roles
  • Identify the appropriate role
  • Apply principle of least privilege
  • Azure Policies
  • Subscription policies
  • Configure security settings by using Azure Policy
  • Configure security settings by using Azure Blueprint
  • Azure resource locks
Security Operations
  • Azure Monitor and Alerts
  • Log Analytics
  • Azure Security Center
  • Evaluate vulnerability scans from Azure Security Center
  • Configure Just in Time VM access by using Azure Security Center
  • Configure centralized policy management by using Azure Security Center
  • Configure compliance policies and evaluate for compliance by using Azure Security Center
  • Monitor Security by using Azure Sentinel
  • Create and customize alerts
  • Data sources for Azure Sentinel
  • Evaluating results
Secure Data Services
  • Azure Database services
  • Azure SQL service
  • SQL long term backup retention
  • Azure SQL DB Advanced Threat Protection
  • Database encryption
  • Design auditing and caching strategies
  • Azure Cosmos DB
  • Azure Data Lake Store
Key Management
  • Encryption and key management
  • Azure Key Vault
  • manage permissions to secrets, certificates, and keys
  • Configure RBAC usage in Azure Key Vault
  • Configure key rotation

Module 3 (CCSP)

Domain 1: Cloud Concepts, Architecture and Design
  • Understand Cloud Computing Concepts
  • Describe Cloud Reference Architecture
  • Understand Security Concepts Relevant to Cloud Computing
  • Understand Design Principles of Secure Cloud Computing
  • Evaluate Cloud Service Providers
Domain 2: Cloud Data Security
  • Describe Cloud Data Concepts
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Technologies and Strategies
  • Implement Data Discovery
  • Implement Data Classification
  • Design and Implement Information Rights Management (IRM)
  • Plan and Implement Data Retention, Deletion and Archiving Policies
  • Design and Implement Auditability, Traceability and Accountability of Data Events
Domain 3: Cloud Platform and Infrastructure Security
  • Comprehend Cloud Infrastructure Components
  • Design a Secure Data Center
  • Analyse Risks Associated with Cloud Infrastructure
  • Design and Plan Security Controls
  • Plan Disaster Recovery (DR) and Business Continuity (BC)
Domain 4: Cloud Application Security
  • Advocate Training and Awareness for Application Security
  • Describe the Secure Software Development Life Cycle (SDLC) Process
  • Apply the Secure Software Development Life Cycle (SDLC)
  • Apply Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Comprehend the Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions
Domain 5: Cloud Security Operations
  • Implement and Build Physical and Logical Infrastructure for Cloud Environment
  • Operate Physical and Logical Infrastructure for Cloud Environment
  • Manage Physical and Logical Infrastructure for Cloud Environment
  • Implement Operational Controls and Standards (e.g., Information Technology Infrastructure Library (ITIL), International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 20000-1)
  • Support Digital Forensics
  • Manage Communication with Relevant Parties
  • Manage Security Operations
Domain 6: Legal, Risk, and Compliance
  • Articulate Legal Requirements and Unique Risks within the Cloud Environment
  • Understand Privacy Issues
  • Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
  • Understand the Implications of Cloud to Enterprise Risk Management
  • Understand Outsourcing and Cloud Contract Design

Admission details

Step 1: To begin the admission process for the Cloud Security Expert course, you need to visit the official programme page first.

Step 2: Choose a learning mode by scrolling down and then click the ‘Enroll Now’ button. A small application form will appear that you must fill to get Infosec Train’s officials to contact you.

Step 3: You can also reserve a seat for a free demo lecture before you enroll.


Filling the form

To register for the Cloud Security Expert programme, enter your active email ID, full name and country name, and phone number in the pop-up form that appears after clicking the ‘Enroll Now’ tab.

Evaluation process

The AZ-500 exam, AWS Certified Security exam, and Certified Cloud Security Professional (CCSP) exams are all MCQ-based tests with varying durations and formats. The AWS certified security exam is for 150 minutes, and the CCSP examination is for 3 hours. The AZ-500 and AWS certified security exams are available in multiple languages. However, the CCSP is only available in the English Language.

How it helps

By enrolling in the Cloud Security Expert online course, you can prepare for three exams – AZ-500, AWS Certified Security, and CCSP – simultaneously, without undergoing separate training for each. This saves you a lot of time and effort.

Most importantly, the course takes on a mixed and flexible learning approach for all three exams, meaning you’ll get diverse guidance on each module, which you navigate at your own time and pace.

Instructors

Mr Rishabh Kotiyal

Mr Rishabh Kotiyal
Trainer
Freelancer

Mr Abhy
Trainer
Freelancer

Mr Krish 1
Instructor
Freelancer

FAQs

Who instructs the Cloud Security Expert course?

Abhi and Krish will be your course instructors.

What are the passing marks for all three exams?

To pass the exam, you have to score 700 out of 1000 in all three examinations.

What is the duration of the CCSP certification exam?

The CCSP exam is 3 hours long.

Does Infosec Train offer any demo lectures?

Yes, you can reserve your seat for a demo lecture by filling the small form on the course website.

Which learning modes does Infosec Train provide?

One-to-one learning, corporate training, and online training are the three learning modes that Infosec Train offers.

Articles

Popular Articles

Latest Articles

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books