Security
Beyond classic training. Start driving digital transformation by upskilling yourself and your team on Security.
Beyond classic training. Start driving digital transformation by upskilling yourself and your team on Security.
The Cloud Academy’s training library includes an entire section dedicated to Security which helps you boost your business and personal growth.
Explore the Cyber Security training for you and your team on Cloud Academy.
View allThis course provides a strong foundation on the fundamentals of cyber security, taking you through cyber risk, how to protect against them, and how cybercriminals can use their targets digital footprints to find exploits.
2 hThis course aims to introduce the learner to the world of Information and Cyber Security.
2 hThis lesson is the fourth installment of four courses covering Domain 1 of the CSSLP, covering the topic of software development methodologies.
32 mExplore the Cloud Security training for you and your team on Cloud Academy.
View allThis course path will introduce you to Amazon GuardDuty and explain how it works and how to configure it, enabling you to use this service within your own AWS accounts to provide automatic and continuous security analysis for safeguarding your entire AWS environment.
2 hThis lesson is intended for IT Professionals who need to develop an understanding of the security solutions that are available in Microsoft Azure.
54 mIn this lab, you will use the Azure Key Vault service in order to store keys and secrets used to encrypt an Azure Virtual Machine (VM).
2 hExplore the Secure Operations training for you and your team on Cloud Academy.
View allThis lesson will give you hands-on demonstrations of how to use the monitoring, logging, error reporting, trace, and profiler components of the Cloud Operations suite.
30 mThis lesson is intended for anyone who wants to learn how to use and manage cloud logging on the GCP platform.
22 mThis lesson provides you with an overview of operations security and how you can use it to mitigate the risks facing cloud-based
5 mExplore the Attack and Defence training for you and your team on Cloud Academy
View allThis learning path has been designed to introduce you to a number of different ethical hacking tools, covering Nmap network scanner, Netcat network utility, and many more.
13 hThis lesson will introduce you to common methods of cyber attacks. It will then take you through the process of protective monitoring and managing security risks.
49 mIn this lab, you will attempt a SQL injection attack using just the web browser, in order to trick the back-end MySQL database server to execute queries injected by you and thus gain access to data that you would not be allowed to access otherwise.
1 hExplore the Secure Development training for you and your team on Cloud Academy.
View allThe objectives of this lesson are to provide you with the ability to understand and support investigations, the requirements for investigation types, and to conduct logging and monitoring activities.
47 mThe objectives of this lesson are to provide you with the ability to employ resource protection techniques, conduct incident response, and many more.
37 mThe objectives of this lesson are to provide you with the ability to implement recovery strategies and disaster recovery processes, and testing the disaster recovery plan.
44 mExplore the Security Certifications for you and your team on Cloud Academy.
View allTake your career to new heights with our cutting-edge Security training. Whether you’re a seasoned IT professional or just starting out, our comprehensive training is designed to equip you with the skills and knowledge you need to excel in the fast-paced world of technology. From Cyber Security to Secure Development and beyond, we offer a wide range of expert-led courses that cater to your unique career goals. Stay ahead of the curve and harness the power of technology with Cloud Academy’s unrivaled Security training.