Cloud Security Training
Learn to think like a hacker to protect your cloud environment.
... > Training Courses > Cloud Security Training
Cloud security training
How do you address the security of your cloud infrastructure? How to ensure your security is sufficient? Learn how to think like a hacker, to protect your cloud environment.
This 2-day in-person training is devised for technical personnel. A basic understanding of Linux and Windows command line and infrastructure is needed.
Why should you attend?
Understand the basics of Cloud Security and Cloud Security Architecture
- To be able to protect your Cloud and hybrid environment
- Address common misconfiguration and vulnerabilities
- Learn tips and tricks from experts in Cloud Security
To configure a more secure Cloud environment
Intended Audience
This training is suitable for:
- Blue team members
- Network administrators
- Security testers
- General security practitioners
- Developers
- Security management staff
Non-technical staff with technical affinity
Required Skills and Expertise
This training is devised for technical personnel. A basic understanding of Linux and Windows command line and infrastructure is needed.

Program
01
Day 1: Cloud Fundamentals and Hands-On Learning
- Cloud Basics: Understand what makes cloud environments different from traditional setups. Overview of cloud models and security implications.
- Security Principles: Introduction to the mindset and responsibilities of a cloud architect.
- Cloud Tooling (AWS Focus): Overview of built-in security tools commonly used in cloud deployments.
- Capture the Flag (CTF): Interactive challenge to apply concepts from the day in a practical, scenario-based exercise.
02
Day 2: Cloud Threats and Platform-Specific Security
- Vulnerability Management: Use of CIS Benchmarks and tools for scanning cloud environments.
- Cloud Vulnerabilities: Analysis of threats specific to cloud environments and how they differ from on-premise risks.
- Azure Focus: Explore Azure’s unique architecture, risks, and security tools.
- Infrastructure as Code (IaC): Introduction to IaC, its role in security, and how to spot vulnerabilities.
- Containers & Kubernetes: Basics of containerization, Kubernetes, and related security tools.
- Final CTF: Apply the full spectrum of course knowledge in a second hands-on challenge.
read more

Abusing FIDO2 Passkeys
This article shows how attackers can misuse Microsoft’s FIDO2 passkey feature to add login methods and take over important accounts.

Cloud Access at Risk: Managing Permissions
Mismanaged cloud permissions are a common risk. This article covers practical ways to control access and reduce exposure across AWS, Azure, and GCP.

Docker and Kubernetes Security Workshop
Learn how attackers target Docker and Kubernetes environments, and how to stop them, in this hands-on, three-day security workshop.
In-Company Training
If you are interested in hosting the Cloud Security Training at your company, please let us know via the contact form or email cybersecurity@bureauveritas.com.

Why choose Bureau Veritas Cybersecurity
Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.
We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.