*** New weekday/weekend batches Going to start - ***Hadoop,Java ,SalesForce ,Selenium , QlikView,Tableau ,Linux ,Python ,Perl,Shell,SAS ,MSBI ,SOA , AWS, Android ****
Cloud Security – Training Modules
1
• Cryptography - Overview
• Hash Functions
o Crypto Hashes and Collisions
o Hash Functions: Applications
o Secure Hash Algorithms
o Hash Functions - Examples
o Exercises: Calculate Hashes
o Proof-of-Work Hash Functions
• MAC and Key Derivation
o HMAC and Key Derivation
o HMAC Calculation - Examples
o Exercises: Calculate HMAC
o KDF: Deriving Key from Password
o PBKDF2
o Modern Key Derivation Functions
o Scrypt
o Bcrypt
o Linux crypt()
o Argon2
o Secure Password Storage
o Exercises: Password Encryption
• Secure Random Generators
o Pseudo-Random Numbers - Examples
o Secure Random Generators (CSPRNG)
o Exercises: Pseudo-Random Generator
• Key Exchange and DHKE
o Diffie–Hellman Key Exchange
o DHKE - Examples
o Exercises: DHKE Key Exchange
• Encryption: Symmetric and Asymmetric
• Symmetric Key Ciphers
o Cipher Block Modes
o Popular Symmetric Algorithms
o The AES Cipher - Concepts
o AES Encrypt / Decrypt - Examples
o Ethereum Wallet Encryption
o Exercises: AES Encrypt / Decrypt
o ChaCha20-Poly1305
o Exercises: ChaCha20-Poly1305
• Asymmetric Key Ciphers
o The RSA Cryptosystem - Concepts
o RSA Encrypt / Decrypt - Examples
o Exercises: RSA Encrypt / Decrypt
o Elliptic Curve Cryptography (ECC)
o ECDH Key Exchange
o ECDH Key Exchange - Examples
o Exercises: ECDH Key Exchange
o ECC Encryption / Decryption
o ECIES Hybrid Encryption Scheme
o ECIES Encryption - Example
o Exercises: ECIES Encrypt / Decrypt
• Digital Signatures
o RSA Signatures
o RSA: Sign / Verify - Examples
o Exercises: RSA Sign and Verify
o ECDSA: Elliptic Curve Signatures
o ECDSA: Sign / Verify - Examples
o Exercises: ECDSA Sign and Verify
o EdDSA and Ed25519
o EdDSA: Sign / Verify - Examples
o Exercises: EdDSA Sign and Verify
• Quantum-Safe Cryptography
o Quantum-Safe Signatures - Example
o Quantum-Safe Key Exchange - Example
o Quantum-Safe Asymmetric Encryption – Example
• More Cryptographic Concepts
o Digital Certificates - Example
o TLS - Example
o One-Time Passwords (OTP) - Example
On
AWS security
syllabus
1. Introduction
Course Tools
AWS Free Tier: Usage Tracking and Billing Widget
2. Secure Global Infrastructure and Compliance
Regions, Availability Zones, and Endpoints
VPC Endpoints
IAM and Compliance
Exercise: AWS Global Infrastructure
Secure Global Infrastructure and Compliance
3. Shared Responsibility and Trusted Advisor
Shared Responsibility Model
Trusted Advisor
Shared Responsibility Model and Trusted Advisor
4. Identity and Access Management (IAM)
Root User
Users and Groups
Roles
Policies
Visual Editor for Policy Creation
Access Advisor
Exercise: Writing IAM Policies
Identity and Access Management (IAM)
5. Encryption Essentials
HSM and KMS
New Lab System Walkthrough
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - KMS Integration with S3
Encryption Essentials
6. OS-Level Access
Overview and SSH
Bastion Host
Linux Example
Windows Remote Desktop Example
Windows Bash Example
Windows PuTTY Example
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Securing Connections with a Bastion Host
OS-Level Access
7. Data Security
Securing Data at Rest: S3 and Glacier
Securing Data at Rest: EBS and RDS
Securing Data at Rest: DynamoDB and EMR
Decommissioning Data and Media
Securing Data in Transit
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - VPC Endpoints and Securing S3
Data Security
8. OS Security
Custom AMIs and Bootstrapping
AWS Systems Manager- Patching/Automation
Mitigating Malware and Abuse
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
Preparing an Instance for a Custom AMI
OS Security
9. Infrastructure Security
VPC Security
Network Segmentation
Strengthening and Threat Protection Layer
Testing and Measurement
AWS Web Application Firewall and Shield
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Network Segmentation Lab
Infrastructure Security
10. Monitoring, Alerting , and Auditing
Monitoring Basics
AWS Config
AWS Systems Manager- Inventory and Insights
AWS Inspector
AWS GuardDuty
Hands-on Labs are real live environments that put you in a real scenario to
practice what you have learned without any other extra charge or account to
manage.
AWS Security Essentials - Using Config to Audit Resources
Monitoring, Alerting , and Auditing
Conclusion
and Next Steps
Practice Exam
No Interview Questions Found..
Our Cloud Security Training Trainers in our Elegant IT Services
Cloud Security Training Placement through Elegant IT Services
I did my NetApp Course at Elegant IT Services Bangalore, I gained lots of knowledge my Trainer was excellent in his subject he cleared all my doubts with any hesitations, Thanks for Elegant IT Services.
Overall a great experience with this training. Elegant IT Services has in-depth knowledge of Java Course with real industry experience.
I really enjoyed coming to institute everyday as there is quality faculty, high standards of teaching for Talend Course good infrastructure machine room for practicals.
I have learned the Java Training in Bangalore in Elegant IT Services. The faculties are well Knowledge and explained the Thinks in a clear manner.
My Trainer had a good experience he was working in MNC, He provided me Some Real time Projects to improve more knowledge about SQL DBA