The Top 7 Cloud Security Courses on LinkedIn Learning
Solutions Review compiled the top cloud security courses on LinkedIn Learning for cloud engineers and administrators of all skill levels.
Are you an IT engineer looking to brush up on your cloud security skills? Looking to earn some certifications in cloud administration and security but don’t know where to start prepping for them? Online courses are a great way to gain knowledge in any field of technology, and cloud security is no exception. However, with so many courses available on so many platforms, it can be difficult to narrow down which ones are right for you. To help alleviate the search for solid online cloud security training, we’ve highlighted seven courses on LinkedIn Learning that are must-takes for any beginner, novice, or proficient cloud engineer or security administrator. Click GO TO TRAINING to learn more and register.
NOTE: We included cloud security courses on LinkedIn Learning with more than 10 student reviews and a rating of 4 stars or better. Courses are listed in alphabetical order.
AWS: Enterprise Security
“Understanding—and successfully implementing—security concepts is essential to using Amazon Web Services (AWS) as your enterprise solution. In this course, instructor Sharif Nijim couples pragmatic advice with practical examples that show IT pros how to create a secure infrastructure within AWS. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key Identity and Access Management (IAM) concepts, including users, groups, roles, and policies. Discover how to manage access to Simple Storage Service (S3); implement detective controls within AWS, including how to work with AWS Config and GuardDuty; use protective tools such as AWS Shield; and use AWS Key Management Service (KMS) to manage access keys. Plus, learn how to prepare for the inevitable audit of your AWS account(s).”
GO TO TRAINING
AWS for Architects: Advanced Security
“Regulations like GDPR have made security a top priority for every organization. Luckily, Amazon Web Services offers a plethora of tools for securing cloud-based architecture. This course teaches IT pros how to use AWS advanced security services, techniques, and tools to protect their users, data, apps, and infrastructure. Instructor Lynn Langit begins with the core tasks and services: setting up the AWS root account, billing, and tagging. She then shows how to set up strong authentication with AWS Identity and Access Management (IAM), Config, Simple AD, and full-fledged Active Directory. She covers infrastructure protection with VPC objects such as subnets, and data protection with KMS and Macie. Finally, she reviews security requirements for different application architectures and the associated AWS security solutions.”
GO TO TRAINING
CCSP Cert Prep: 1 Cloud Concepts, Architecture, and Design
“Almost every organization relies on cloud technology. Email, applications, or complex virtual infrastructure—it all runs in the cloud. This has created a high demand for the Certified Cloud Security Professional (CCSP), who can help businesses secure information and systems that used to live on site. This course covers the first domain of the CCSP certification exam: Cloud Concepts, Architecture, and Design. Discover how the cloud reference architecture defines a model for cloud computing. Explore security concepts relevant to cloud computing and understand the design principles for secure operation in the cloud. Security expert Mike Chapple also reviews emerging cloud-based technologies, such as machine learning, blockchain, and quantum computing. Plus, find out how to evaluate cloud service providers using security standards including ISO 27017, PCI DSS, the Common Criteria, and FIPS 140-2. By the end of the course, you’ll be grounded in the foundations of cloud security and feel more prepared for the first domain of the CCSP exam.”
GO TO TRAINING
Cybersecurity with Cloud Computing
“More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.”
GO TO TRAINING
Ethical Hacking: Cloud Computing
“Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more.”
GO TO TRAINING
Learning Cloud Computing: Cloud Security
“Understand the basics of cloud security—a core component of cloud computing. Beginning with the basics, instructor David Linthicum explains the business case for cloud security and the levels and models available, including infrastructure-, application-, and data-level security; identity and risk management; encryption; and multifactor authentication. He then dives into the services offered by the top three cloud providers: Amazon, Microsoft, and Google. He reviews the compliance issues that affect specific industries, including health care and finance, and reviews the points you need to consider when identifying your security requirements and the security tools, services, and software to best meet those needs.”
GO TO TRAINING
Microsoft Azure: Security Concepts
“The professionals in charge of Azure administration need to know how to secure services correctly to protect the data flowing between client computers and the cloud. This course investigates security concepts related to Azure deployment and services such as Office 365 and Azure Active Directory. Find out how to work with the security portals, secure virtual machines, implement more robust multi-factor authentication, and protect your services and data, including email, documents, and user data. Plus, learn best practices for successfully securing your Azure deployment.”
GO TO TRAINING
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
Looking for a managed service provider for your cloud solutions? Our MSP Buyer’s Guide contains profiles on the top managed cloud service providers for AWS, Azure, and Google Cloud, as well as questions you should ask vendors and yourself before buying. We also offer an MSP Vendor Map that outlines those vendors in a Venn diagram to make it easy for you to select potential providers.
Check us out on Twitter for the latest in Enterprise Cloud news and developments!