Cloud Security Battle Path
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Cloud Security Overview
- Shared Responsibilities
- IAM: Overview
Module 2
- IAM: Managing Users
- IAM: Managing Roles
- IAM: Strong Passwords
- Cloud Access Security Broker Introduction
Module 3
- IAM: Principle of Least Privilegen
- Data Deletion
- Data Encryption
- Access Control
Module 4
- AWS Overview
- AWS: IAM Stack
- AWS: Enabling MFA
- AWS: Enabling CloudTrail
Module 5
- AWS: Deleting Account Access Keys
- AWS: IAM Roles
- AWS: IAM Policies
Module 6
- Azure Security for the SOC
- Azure: Understanding Attack Surface
- Azure: Monitoring Cloud Processes
Module 7
- Azure: Investigations in the Cloud
- Azure: Security Cente
- Azure: Public Permissions
Module 8
- Containing Lateral Movement in the Cloud
- Isolating Attacks
- Cloud Cryptomining Attacks
Module 9
- Log Management using Splunk
- Log Management using QRadar
- Misconfigurations
Module 10
- EDR in the Cloud
- Hybrid Cloud Security Concepts
- Cloud Governance, Risk, and Compliance
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Cloud Security Overview
- Shared Responsibilities
- IAM: Overview
Module 2
- IAM: Managing Users
- IAM: Managing Roles
- IAM: Strong Passwords
- Cloud Access Security Broker Introduction
Module 3
- IAM: Principle of Least Privilegen
- Data Deletion
- Data Encryption
- Access Control
Module 4
- AWS Overview
- AWS: IAM Stack
- AWS: Enabling MFA
- AWS: Enabling CloudTrail
Module 5
- AWS: Deleting Account Access Keys
- AWS: IAM Roles
- AWS: IAM Policies
Module 6
- Azure Security for the SOC
- Azure: Understanding Attack Surface
- Azure: Monitoring Cloud Processes
Module 7
- Azure: Investigations in the Cloud
- Azure: Security Cente
- Azure: Public Permissions
Module 8
- Containing Lateral Movement in the Cloud
- Isolating Attacks
- Cloud Cryptomining Attacks
Module 9
- Log Management using Splunk
- Log Management using QRadar
- Misconfigurations
Module 10
- EDR in the Cloud
- Hybrid Cloud Security Concepts
- Cloud Governance, Risk, and Compliance