Course Summary

Protecting multi-cloud environments is a complex challenge. Default security controls are often inadequate, and what works in one of the major cloud service providers (CSPs) may not function the same way in another. Many cloud security controls are designed with compliance in mind, rather than being based on real-world attack scenarios. To safeguard an organization’s most critical cloud assets, attack-driven security controls are essential.

It’s important to accept that application flaws are inevitable, whether the application is developed internally or by a third party. This acceptance is key to building effective cloud security controls. While not all cybersecurity professionals can patch vulnerable application code, securing the cloud configuration is usually a more feasible way to mitigate these risks. Relying solely on a CSP’s default security settings and documentation is insufficient. SEC510 reveals numerous examples of incomplete, incorrect, or conflicting CSP controls. Moreover, if a zero-day vulnerability is discovered in a cloud service your organization uses, it’s crucial to prepare for its potential impact by focusing on what you can control.

Key topics include:

Evaluating and comparing public cloud service providers
Auditing, hardening, and securing public cloud environments
Introduction to multi-cloud compliance and integration

Cloud Data Protection
The candidate will demonstrate knowledge of key management systems and the processes required to assess and secure them. The candidate will also show familiarity with using encryption services to protect sensitive data stored in cloud platforms.

Cloud Identity and Access Management
The candidate will demonstrate an understanding of cloud Identity and Access Management (IAM), its security implications, and the necessary steps to secure IAM policies.

Cloud Integration and Benchmarking
The candidate will demonstrate familiarity with the tools and services used to audit cloud environments for compliance with various benchmarks. The candidate will also demonstrate best practices for storing long-term credentials and an understanding of cloud end-user identity management solutions and cloud single sign-on (SSO) solutions.

Multicloud and Credential Management Fundamentals
The candidate will demonstrate an understanding of the security concerns within the current public cloud landscape. The candidate will also demonstrate knowledge of instance metadata APIs, how these can be exploited in credential-based attacks, and how to assess their security.

Securely Accessing Cloud Services
The candidate will demonstrate familiarity with private service endpoints and securing remote administrative access to cloud platforms.

Securing Cloud Application Service Platforms
The candidate will demonstrate an understanding of cloud application services and how to secure common configurations. The candidate will also show familiarity with Google’s Firebase database offering and techniques for hardening its configurations.

Securing Cloud Storage Platforms
The candidate will demonstrate an understanding of how to secure cloud storage services and the data exfiltration risks associated with these services.

Securing Serverless Functions
The candidate will demonstrate familiarity with serverless architectures and how to assess these environments for security misconfigurations. The candidate will also demonstrate an understanding of how to secure serverless functions against persistence attacks.

Virtual Network Security and Logging
The candidate will demonstrate knowledge of default virtual private network settings and the steps required to secure them. The candidate will also show an understanding of virtual network logging and monitoring capabilities.

The following courses or equivalent experience are prerequisites for SEC510: GIAC Cloud Security Essentials Certification (GCLD) and Exam code SEC488.

proctored exam 75 questions 2 hours Minimum passing score of 64%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?