*** New weekday/weekend batches Going to start - ***Hadoop,Java ,SalesForce ,Selenium , QlikView,Tableau ,Linux ,Python ,Perl,Shell,SAS ,MSBI ,SOA , AWS, Android ****
Cloud Security – Training Modules
1
• Cryptography - Overview
• Hash Functions
o Crypto Hashes and Collisions
o Hash Functions: Applications
o Secure Hash Algorithms
o Hash Functions - Examples
o Exercises: Calculate Hashes
o Proof-of-Work Hash Functions
• MAC and Key Derivation
o HMAC and Key Derivation
o HMAC Calculation - Examples
o Exercises: Calculate HMAC
o KDF: Deriving Key from Password
o PBKDF2
o Modern Key Derivation Functions
o Scrypt
o Bcrypt
o Linux crypt()
o Argon2
o Secure Password Storage
o Exercises: Password Encryption
• Secure Random Generators
o Pseudo-Random Numbers - Examples
o Secure Random Generators (CSPRNG)
o Exercises: Pseudo-Random Generator
• Key Exchange and DHKE
o Diffie–Hellman Key Exchange
o DHKE - Examples
o Exercises: DHKE Key Exchange
• Encryption: Symmetric and Asymmetric
• Symmetric Key Ciphers
o Cipher Block Modes
o Popular Symmetric Algorithms
o The AES Cipher - Concepts
o AES Encrypt / Decrypt - Examples
o Ethereum Wallet Encryption
o Exercises: AES Encrypt / Decrypt
o ChaCha20-Poly1305
o Exercises: ChaCha20-Poly1305
• Asymmetric Key Ciphers
o The RSA Cryptosystem - Concepts
o RSA Encrypt / Decrypt - Examples
o Exercises: RSA Encrypt / Decrypt
o Elliptic Curve Cryptography (ECC)
o ECDH Key Exchange
o ECDH Key Exchange - Examples
o Exercises: ECDH Key Exchange
o ECC Encryption / Decryption
o ECIES Hybrid Encryption Scheme
o ECIES Encryption - Example
o Exercises: ECIES Encrypt / Decrypt
• Digital Signatures
o RSA Signatures
o RSA: Sign / Verify - Examples
o Exercises: RSA Sign and Verify
o ECDSA: Elliptic Curve Signatures
o ECDSA: Sign / Verify - Examples
o Exercises: ECDSA Sign and Verify
o EdDSA and Ed25519
o EdDSA: Sign / Verify - Examples
o Exercises: EdDSA Sign and Verify
• Quantum-Safe Cryptography
o Quantum-Safe Signatures - Example
o Quantum-Safe Key Exchange - Example
o Quantum-Safe Asymmetric Encryption – Example
• More Cryptographic Concepts
o Digital Certificates - Example
o TLS - Example
o One-Time Passwords (OTP) - Example
On
AWS security
syllabus
1. Introduction
Course Tools
AWS Free Tier: Usage Tracking and Billing Widget
2. Secure Global Infrastructure and Compliance
Regions, Availability Zones, and Endpoints
VPC Endpoints
IAM and Compliance
Exercise: AWS Global Infrastructure
Secure Global Infrastructure and Compliance
3. Shared Responsibility and Trusted Advisor
Shared Responsibility Model
Trusted Advisor
Shared Responsibility Model and Trusted Advisor
4. Identity and Access Management (IAM)
Root User
Users and Groups
Roles
Policies
Visual Editor for Policy Creation
Access Advisor
Exercise: Writing IAM Policies
Identity and Access Management (IAM)
5. Encryption Essentials
HSM and KMS
New Lab System Walkthrough
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - KMS Integration with S3
Encryption Essentials
6. OS-Level Access
Overview and SSH
Bastion Host
Linux Example
Windows Remote Desktop Example
Windows Bash Example
Windows PuTTY Example
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Securing Connections with a Bastion Host
OS-Level Access
7. Data Security
Securing Data at Rest: S3 and Glacier
Securing Data at Rest: EBS and RDS
Securing Data at Rest: DynamoDB and EMR
Decommissioning Data and Media
Securing Data in Transit
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - VPC Endpoints and Securing S3
Data Security
8. OS Security
Custom AMIs and Bootstrapping
AWS Systems Manager- Patching/Automation
Mitigating Malware and Abuse
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
Preparing an Instance for a Custom AMI
OS Security
9. Infrastructure Security
VPC Security
Network Segmentation
Strengthening and Threat Protection Layer
Testing and Measurement
AWS Web Application Firewall and Shield
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Network Segmentation Lab
Infrastructure Security
10. Monitoring, Alerting , and Auditing
Monitoring Basics
AWS Config
AWS Systems Manager- Inventory and Insights
AWS Inspector
AWS GuardDuty
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Using Config to Audit Resources
Monitoring, Alerting , and Auditing
Conclusion
and Next Steps
Practice Exam
No Interview Questions Found..
Our Cloud Security Training Trainers in our Elegant IT Services
Cloud Security Training Placement through Elegant IT Services
I was enrolled for PL/ SQL Training in Bangalore from Elegant IT Services, it's a very good training institute in Marathahalli.
Elegant IT Service trainers are very skilled experts and practical knowledge they have. They provided the training that was really helpful to me. I will recommend this Training Institute for the Oracle fusion course in Bangalore.
Excellent training institutes in Bangalore and they have provided me very good placement support as well. Thank you, Elegant IT Services.
The teaching staff is excellent and also the facilities over there is good. There are many computers and anytime you can practice what you want.
The instructor is very good, I respect the way he teaches and really likes the interest he comes with, I'm impressed. Concepts are clear, understanding is obtained, Nice to be part of Elegant IT Services.