Hosting applications and services with cloud providers has been one of the largest trends of the last decade in the IT world. While replacing your own infrastructure with that of a public cloud provider gives usability benefits, it creates a whole new set of security problems that people in operational or development roles need to be aware of.
This course gives an overview over many of the most widely used cloud services and their specific security threats and best practices. It provides you with the theoretical background to understand how problems arise, as well with the hands-on knowledge to effectively counter those threats within your organization.
Will discuss the most popular AWS services and their security applications, covering the following subjects and questions:
While tailored toward the Amazon Web Services (AWS), the largest public cloud provider of today's market, most of the concepts and lessons can be extrapolated to other providers like Azure, Google Cloud Platform or the AliBaba Cloud.
Everyone interesting in using cloud services
This course should contain valuable to lessons for everyone, even those without prior cloud usage experience. Since the hands-on exercises make use of AWS, some basic working knowledge with using standard cloud services from the management console and the CLI (command line interface), preferably from AWS (e.g. creating a EC2 instance or S3 bucket) is required to participate in the exercises.
To participate in the hands-on exercises, participants will need a laptop with a current version of a modern browser (e.g. Firefox, Chrome). Optionally, we recommend to install the following software: