From safety to compliance: master the fundamentals
for optimal risk management on the cloud!
Eligible CPF and multi-financing up to 100%
To be recalled Access to the programmeApproach 3P
Our training centre guides you in identifying the ideal training, helping you maximize funding opportunities.
We put all the keys in hand for a start with confidence.
Experience an immersive and intensive training experience, designed to dive into practical workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.
At the end of your career, we evaluate your acquired skills, issue certification attesting to your expertise, and accompany you to ensure your success in your professional projects.
You are now ready to excel!
Description of the training
This training provides the necessary skills to protect cloud environments from threats, while managing the risk management strategies associated with adopting the cloud in an organization.
Objectives of training
At the end of this training, participants will be able to:
- Understand cloud security issues and risks specific to cloud environments.
- Learn how to secure cloud resources using native security tools and services.
- Implement risk management strategies to ensure compliance and minimize threats.
- Apply the principles of security governance to manage access, identities and resources.
- Evaluate and respond to security incidents in cloud environments with monitoring and response tools.
Who is this training for?
The training is aimed at a wide audience, including:
- Cloud Architects that design secure infrastructure.
- Security managers who manage risks in the cloud.
- Cloud administrators implementing security strategies.
- Project leaders who want to integrate best security practices into their cloud projects.
- Compliance and risk management professionals in the cloud.
Prerequisites
Basic knowledge of information systems.
Training programme
Introduction to Cloud Security and Risk Management
- Introduction to Cloud Computing Risks
- Differences between cloud security and the security of traditional infrastructure.
- Types of risks in the cloud (infrastructure, data, access risks)
- Risk assessment and implementation of audit processes
- Introduction to Risk Management Concepts: Risk Identification, Assessment and Treatment
- Cloud Network Security Configuration: Firewall, VPC, and Application Security
- Using cloud services for resource management (authentication, encryption, data protection).
- Best practices to secure cloud storage and computing.
- Cloud Access Governance and Management (IAM, RBAC) Configuration de la sécurité des réseaux dans le cloud : pare-feu, VPC, et sécurité des applications
- Multi-factor authentication (MFA)
- Identity and Compliance Management Strategies
Training assets
- Pedagogical approach: An alternative between theory and practice for better assimilation of concepts.
- Qualified speakers: Specialist trainers with practical experience in the field of cloud security.
- Educational tools and materials: Access to online resources, live demonstrations and real-life case studies.
- Accessibility: Training is open to all, without advanced technical prerequisites.
Pedagogical methods and tools used
Live demonstrations on cloud security.
Real case studies and practical work.
Discussions on best practices in the field.
Project management tools for monitoring and feedback.
Evaluation
- MCQ at the end of training.
- Practical case studies.
- Continuous evaluation with personalized feedback.
Normative References
- Well-Architected Cloud Providers Framework
- ISO/IEC 19086
- GDPR (General Data Protection Regulation)
- NIST Cloud Computing Standards (SP 500-292)
- ISO 27001 Information Security): Guarantees data security in cloud environments while monitoring and managing costs