Cloud Environment Security (AWS, Azure, Google cloud)

Cloud Environment Security (AWS, Azure, Google cloud)

Cloud Environment Security (AWS, Azure, Google cloud)

The cloud has changed our work habits, providing companies with more flexibility and responsiveness. However, the cloud has also created new vulnerabilities. Misconfigured access, data leaks, or attacks on APIs are all risks to anticipate. With this training, learn how to secure your AWS, Azure, and Google Cloud environments by implementing the best practices for identity management, encryption, monitoring, and regulatory compliance.

Program

Program

Day 1 - Fundamentals of Cloud Security 


Morning – 9 AM to 12:30 PM

Introduction to Shared Responsibility Models 

• Differences between SaaS, PaaS, IaaS, and their impacts on security. 

• Sharing of responsibilities between client and provider. 

 

Securing Identities and Access (IAM) 

• Management of roles and permissions in AWS, Azure, and GCP. 

• Implementation of Least Privilege Access and MFA. 


Afternoon – 1:30 PM to 5 PM


Data Security and Encryption 

• Encryption techniques and KMS key management. 

• Protection of databases and storage (S3, Blob, GCS). 

 

Practical Cloud Security Exercise 

• Secure configuration of an AWS S3 bucket. 

• Permission audit and detection of common errors. 



General information

General information

1,200 € before tax

Objective

Raising awareness among companies about the issues of cloud security

Target audience

IT teams, cloud architects, DevOps

Level

Intermediate

Duration

One (1) day

This training is offered in partnership with Académie Cyber, an accredited organization. It is Qualiopi certified and eligible for CPF.

Other training offered by De Shagan Network

Other courses offered by
De Shagan Network

Cyber Incident Management and First Responses

A cyberattack can have serious consequences. This training allows IT teams and SOC analysts to respond quickly.

Target

Target

- IT teams, SOC, system administrators

- IT teams, SOC, system administrators

IT teams, SOC, system administrators

Level

Level

- Intermediate / Advanced

- Intermediate / Advanced

Intermediate / Advanced

Duration

Duration

- Two (2) days

- Two (2) days

Two (2) days

Application security and DevSecOps

A simple bug can be an entry point for a cyberattack. Make sure your developers implement the best practices from the OWASP Top 10.

Target

Target

- Developers, DevOps, IT teams

- Developers, DevOps, IT teams

Developers, DevOps, IT teams

Level

Level

- Intermediate / Advanced

- Intermediate / Advanced

Intermediate / Advanced

Duration

Duration

- Two (2) days

- Two (2) days

Two (2) days

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Our locations

Follow us!

Find our news updates on

© 2024 De Shagan Network. All rights reserved.

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Follow us!

Find our news updates on

Our locations

© 2024 De Shagan Network. All rights reserved.

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Our locations

Follow us!

Find our news updates on

© 2024 De Shagan Network. All rights reserved.