Curriculum
- 21 Sections
- 164 Lessons
- 24 Weeks
Expand all sectionsCollapse all sections
- Week 1Incident Response & AWS Security Fundamentals8
- Week 2Incident Response & Automated Security Management8
- Week 3Security Logging & Monitoring8
- 3.1AWS CloudTrail and logging setup60 Minutes
- 3.2AWS CloudWatch security monitoring
- 3.3AWS Config for compliance checks
- 3.4AWS Macie for sensitive data detection
- 3.5AWS Athena for security logs analysis
- 3.6VPC Flow Logs implementation
- 3.7S3 Security & access logging
- 3.8Best practices for AWS security monitoring
- week 4Infrastructure Security & Network Protection8
- week 5Identity & Access Management (IAM) Fundamentals8
- week 6Advanced Identity & Access Security8
- week 7Data Protection & Encryption8
- week 8Secure Containers & Data Security8
- week 9Azure Cloud Security Fundamentals8
- 9.1Azure cloud architecture overview
- 9.2Azure resource groups, tags & ARM templates
- 9.3Azure resource groups, tags & ARM templates
- 9.4Azure subscription security controls
- 9.5Billing & cost security in Azure
- 9.6Azure Security Center overview
- 9.7Azure Key Vault basics
- 9.8Implementing security policies in Azure
- week 10Virtual Machines & Host Security8
- week 11Azure Storage Security8
- week 12Azure Networking & Edge Security8
- week 13Azure Identity & Access Management (IAM)8
- week 14Azure Security Operations & Compliance8
- 14.1Azure Security Center monitoring
- 14.2Vulnerability scans with Security Center
- 14.3Just-in-time VM access control
- 14.4Azure Sentinel security monitoring
- 14.5Security alerts & threat intelligence
- 14.6Compliance auditing & reporting
- 14.7Azure Policy for security compliance
- 14.8Security governance best practices
- week 15Azure Secure Application Development8
- 15.1Azure App Service security
- 15.2Secure API development in Azure
- 15.3Azure Kubernetes Service (AKS) security
- 15.4Container security best practices
- 15.5Secure software development lifecycle (SDLC)
- 15.6Application vulnerability assessments
- 15.7Secure CI/CD pipeline strategies
- 15.8Protecting serverless applications in Azure
- week 16Azure Data Security & Encryption8
- 16.1Azure Database security fundamentals
- 16.2SQL Server Advanced Threat Protection
- 16.3Azure Data Lake security best practices
- 16.4Data encryption at rest & in transit
- 16.5Azure Key Vault secrets management
- 16.6Secure cloud backups & recovery
- 16.7Role of compliance in Azure security
- 16.8Secure data transfer techniques
- week 17Cloud Security Concepts & Architecture8
- 17.1Understanding cloud computing risks
- 17.2Cloud reference architecture models
- 17.3Shared security responsibility in the cloud
- 17.4Secure cloud design principles
- 17.5Choosing secure cloud service providers
- 17.6Evaluating cloud security solutions
- 17.7Cloud security compliance frameworks
- 17.8Emerging trends in cloud security
- week 18Cloud Data Security8
- 18.1Cloud data storage security risks
- 18.2Data classification techniques
- 18.3Implementing Information Rights Management (IRM)
- 18.4Secure data retention policies
- 18.5Cloud encryption best practices
- 18.6Secure data discovery & classification
- 18.7Cloud data access controls
- 18.8Cloud auditability & accountability
- week 19Cloud Infrastructure Security8
- 19.1Secure cloud infrastructure design
- 19.2Risk assessment in cloud environments
- 19.3Disaster recovery (DR) & business continuity (BC) planning
- 19.4Secure network segmentation in cloud
- 19.5Hypervisor security best practices
- 19.6Virtual machine security guidelines
- 19.7Security patching strategies
- 19.8Zero Trust security model
- week 20Cloud Application Security & IAM8
- 20.1Secure Software Development Lifecycle (SDLC)
- 20.2Application security testing in cloud
- 20.3Cloud-native IAM strategies
- 20.4SAML, OAuth & OpenID security models
- 20.5API security in cloud applications
- 20.6Application security monitoring tools
- 20.7Secure DevOps (DevSecOps) best practices
- 20.8Cloud security automation
- week 21- 24(Practical)Legal, Compliance & Final Review4