"A Training Solution Provider delivering Learning Skills to keep forever"

Call the JCS training team free now 0800 5425 150 Or mail Email | training@jcstraining.com

Practitioner Certificate In Cloud Security Duration: 5 Days

Course Overview

This five day Certified Cloud Security Practitioner course is focused on Cloud Security, encompassing Cloud Security Architecture, DevSecOps, Data and Assurance aspects, Governance, Cloud Security Operations and Web Application Security. The course spans cloud security principles, patterns and architectural frameworks, data protection and compliance for cloud based applications, data and infrastructure, and the design, development and implementation of cloud security architectures. We will review the wide range of technical security controls available using Cloud Service Provider and partner technologies, automation and DevSecOps, assurance, audit and security testing of cloud based services. Containers and serverless architectures will be introduced and their security implications reviewed. Agile DevOps methodologies will be covered and the use of a Continuous Integration Pipeline for security improvements, validation and testing. The course is delivered through presentations, discussions, practical demonstrations and 'hands-on' labs. You will gain practical hands-on experience of implementing and using cloud technologies and technical security controls in labs based on services from leading cloud service providers (AWS, Google & Microsoft) and consolidate learning in a group workshop to develop a cloud security architecture, based on a realistic scenario.



This course is aimed at technical and security specialists looking to develop and operate secure applications and systems using an agile DevOps methodology with fully automated deployments to cloud environments.


There are no pre-requisites. However, we recommend that all delegates have an understanding of the general technologies, for example Operating Systems and Networking and Security principles. Experience of using cloud services and security technologies is helpful but not essential.

Delegates will learn how to

Delegates will learn about the following topics:

Cloud Concepts


Cloud Security Frameworks, Principles, Patterns and Certifications

AWS Security Technologies

Microsoft Azure and Office 365

Google Apps for Work


Data Protection and Compliance


Delegates will learn about the following topics:

Web Application Security

Cloud Identity Services


Cloud Security as a Service


Continuous Integration Pipeline






Objectives of course


Cloud Concepts

What is Cloud Computing?

Why is everyone moving to the Cloud?

Cloud computing model

Infrastructure, Platform and Software as a Service

Boundaries and responsibilities

Cloud Service Providers – Gartner Magic Quadrant(s)

Cloud reference architectures


Overview of different virtualisation technologies and types covering storage, networks and systems.

Cloud Security Frameworks, Principles, Patterns and Certifications

Security Principles

Separation and layers as security controls

Cloud Security Alliance (CSA) Cloud Control Matrix

GOV.UK Cabinet Office and NCSC Cloud Security Principles

Security Architecture Frameworks

Security Architecture Patterns

Cloud Security Architecture Patterns

Trusted Cloud Initiative Reference Architecture

Cloud Security Certifications

AWS Security Technologies

EC2 (Elastic Compute Cloud) and VPC (Virtual Private Cloud) fundamentals

Availability zones and regions

Internet Gateway, Elastic IPs, NAT Gateway, DirectConnect

Security Implications of Elastic Load Balancing (ELB) and auto-scaling

Security Groups, Flow Logs, S3, ACLs and subnet routing

AWS Config, CloudTrail, CloudWatch, Trusted Advisor

IPSec VPN options: AWS VPNs, third party solutions

AWS CloudFront, Web Application Firewall and Certificate Manager

Vulnerability management using AWS Inspector

AWS Key Management Service (KMS) and CloudHSM

AWS Identity and Access Management (IAM)

Labs providing practical experience of implementing and using AWS security technologies


End of day knowledge check – exam style questions


Microsoft Azure and Office 365

Azure platform security architecture

Azure Virtual Networks

Azure network security best practices

Azure data security and encryption best practices

Azure Active Directory

Federated identity and Single Sign On

Azure Multi-factor authentication

Azure Key Vault

Azure Virtual Machine encryption

Microsoft Antimalware for Azure Cloud Services and Virtual Machines

Azure Security Center

Office 365 Service Architectures

Office 365 security across physical, logical and data layers

Office 365 email encryption options

Exchange Online Protection

GOV.UK Microsoft Office Security Guidance

Labs providing practical experience of implementing and using Microsoft Azure security technologies

Google Apps for Work

Google Apps for Work applications and architectures

Integration with corporate directories

Single sign-on to enforce use of corporate devices and threat prevention

GOV.UK Google Apps for Work Security Guidance

Google Admin Console

Google Authenticator

Organisational Units

Administrative roles

Data privacy opt-in


Centre for Internet Security (CIS) Foundation Benchmarks

Penetration tests of cloud environments

External audit and configuration review

Data Protection and Compliance

Personally Identifiable Information (PII) and Personal Data

UK Data Protection Act and Information Commissioner’s Office (ICO)

European Union (EU) Data Protection Directive

EU General Data Protection Regulation (GDPR)

Cyber Essentials Plus

Cloud Security Alliance STAR


AICPA SOC3 (formerly SAS70)

ISO 27001


End of day knowledge check – exam style questions



Concept of containers


Why development teams are moving to containers

Security issues of containers

Container security good practice

CIS Benchmark for Docker and Docker Bench tool

Orchestration – Kubernetes

Security features of Kubernetes

Orchestration – Docker Swarm

Cloud Service Provider container platforms (AWS, Azure, Google)

Container security solutions (e.g. Twistlock, NeuVector, AquaSecurity)

Labs providing hands-on experience of Docker containers and potential security issues

Web Application Security

OWASP Top 10

Threat Modelling

Secure Software Development Lifecycle

Cloud Identity Services


oAuth, oAuth 2.0 and OpenID Connect

Cloud Identity Providers


End of day knowledge check – exam style questions



Concept of ‘serverless’

Pros and Cons

AWS Lambda

Step functions

Dynamo DB


Serverless application architecture

Security implications

Environment Variable encryption

Azure Cloud Functions

Google Cloud Functions

Labs providing hands-on experience of Serverless architectures

Cloud Security as a Service

Cloud Security Services

Cloud analytics, e.g. Splunk Cloud

Cloud security operations management, e.g. AlertLogic


End of day knowledge check – exam style questions

Cloud Security Workshop

Scenario requirement

Develop security architecture in groups

Present back to wider group, review and discuss



Cloud service provider automation tools

Terraform by Hashicorp

Hardened build images

Vault by Hashicorp

Patching and update strategies


Continuous Integration Pipeline

Continuous Integration Pipeline

Automated environment testing


Security issues

DevSecOps Lab

Hands-on experience of coding security improvements and automated deployments


End of section quiz – exam style questions


Independent APMG Certified Exam – 100 questions, 2 hours, pass mark 50%