Cloud Security Training

Learn to think like a hacker to protect your cloud environment.

... > Training Courses > Cloud Security Training

Cloud security training

How do you address the security of your cloud infrastructure? How to ensure your security is sufficient? Learn how to think like a hacker, to protect your cloud environment.

This 2-day in-person training is devised for technical personnel. A basic understanding of Linux and Windows command line and infrastructure is needed.

Why should you attend?

Understand the basics of Cloud Security and Cloud Security Architecture

  • To be able to protect your Cloud and hybrid environment
  • Address common misconfiguration and vulnerabilities
  • Learn tips and tricks from experts in Cloud Security
  • To configure a more secure Cloud environment

     

Intended Audience

This training is suitable for:

  • Blue team members
  • Network administrators
  • Security testers
  • General security practitioners
  • Developers
  • Security management staff
  • Non-technical staff with technical affinity

     

Required Skills and Expertise

This training is devised for technical personnel. A basic understanding of Linux and Windows command line and infrastructure is needed.

Image in image block

Program

01

Day 1: Cloud Fundamentals and Hands-On Learning

  • Cloud Basics: Understand what makes cloud environments different from traditional setups. Overview of cloud models and security implications.
  • Security Principles: Introduction to the mindset and responsibilities of a cloud architect.
  • Cloud Tooling (AWS Focus): Overview of built-in security tools commonly used in cloud deployments.
  • Capture the Flag (CTF): Interactive challenge to apply concepts from the day in a practical, scenario-based exercise.

02

Day 2: Cloud Threats and Platform-Specific Security

  • Vulnerability Management: Use of CIS Benchmarks and tools for scanning cloud environments.
  • Cloud Vulnerabilities: Analysis of threats specific to cloud environments and how they differ from on-premise risks.
  • Azure Focus: Explore Azure’s unique architecture, risks, and security tools.
  • Infrastructure as Code (IaC): Introduction to IaC, its role in security, and how to spot vulnerabilities.
  • Containers & Kubernetes: Basics of containerization, Kubernetes, and related security tools.
  • Final CTF: Apply the full spectrum of course knowledge in a second hands-on challenge.

In-Company Training

If you are interested in hosting the Cloud Security Training at your company, please let us know via the contact form or email cybersecurity@bureauveritas.com.

USP

Why choose Bureau Veritas Cybersecurity

Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.

We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.