SEC488: SANS Live Online Europe January 2025
Provided by SANS
What You Will Learn
Essential knowledge for a secure cloud environment
Imagine becoming the cloud security expert your organization desperately needs. With attackers relentlessly targeting cloud vulnerabilities, it's crucial to have robust defenses in place. SEC488 is your gateway to mastering cloud security and ensuring a seamless, secure cloud migration. This course doesn't just teach you the theory--it immerses you in real-world, technical challenges, equipping you with the skills to tackle identity guardrails, cloud storage, virtual machines, automation, remote management, and more. Dive into critical issues like Identity and Access Management (IAM) and securing S3 Buckets and emerge with the confidence to mitigate risks during lift-and-shift transitions.
SEC488 goes beyond conventional learning. You'll engage in dynamic, hands-on labs within actual cloud service provider (CSP) environments on AWS and Azure. Experience the thrill of live-fire exercises and a Capstone Capture the Flag event that puts your skills to the test. Learn to effectively limit and mitigate the impact of cloud security breaches and prevent costly disruptions like service shutdowns or unauthorized bitcoin mining operations. This course not only enhances compliance and protects your organization's reputation and assets, but also boosts employee retention and team knowledge. Elevate your cloud security expertise with SEC488 and become the defender your organization relies on.
"Solid content, good pace, and great explanations, plus it's helpful to see how all of these cloud and security concepts can be integrated and applied in real life." Craig Harris, SMBC
What Is Cloud Security?
Cloud security involves adapting traditional security practices to the public cloud environment by leveraging the shared responsibility model. It requires applying vendor-provided controls to protect applications, data, and brand within the cloud environment. Effective cloud security includes Identity and Access Management (IAM), data protection, network security, and continuous monitoring to safeguard cloud resources and maintain a strong security posture.
Business Takeaways
Just like advanced flight simulators for commercial pilots, the SEC488 lab environment immerses students in practical, real-world exercises to apply the theory and skills learned during lectures. With 15 hours dedicated entirely to hands-on keyboard experiences, students gain the ability to "fly the plane" rather than just read the manual. Students rave about the SEC488 exercises because they are effective! Continuously updated to match vendor changes, the SEC488 labs are resilient, and students get extended access to lab content via the course lab workbook.
This multicloud, immersive lab environment features a variety of cloud resources such as virtual machines, storage services, and security tools, all configured to simulate real-world scenarios. This setup gives students comprehensive exposure to different cloud service providers. The "choose your own adventure" format allows students to select their preferred cloud vendor for each lab, whether it's AWS or Azure, across 20 labs and a gamified capture the flag in Section 6.
Labs offer a vital opportunity to apply theoretical knowledge in a controlled setting, helping students solidify their understanding of cloud security principles. By actively engaging in these repeatable labs, students can practice and hone their skills, ensuring they are well-prepared to tackle cloud security challenges in their organizations from day one back in the office.
"As a relative cloud newb, this course has really allowed me to understand how to best secure the cloud. My day to day role doesn't allow for hands on work so I've particularly enjoyed the labs." - Will Hotard, State of Louisiana OTS
"The labs serve to both break up a fairly intensive academic upskilling, and also to teach you how to apply the knowledge correctly and safely, allowing you to secure your cloud environment with confidence and ease." - Matt Hunter, National E-Crime Team
"I appreciate the thorough information, and how it is delivered. Plus the steps are very helpful and easy to follow." - Taylor Ripplinger, Encompass Health
Syllabus Summary
Depending on your professional goals and direction, SANS offers a number of follow-on courses to SEC488.
Cloud Security Analyst
Essential knowledge for a secure cloud environment
Imagine becoming the cloud security expert your organization desperately needs. With attackers relentlessly targeting cloud vulnerabilities, it's crucial to have robust defenses in place. SEC488 is your gateway to mastering cloud security and ensuring a seamless, secure cloud migration. This course doesn't just teach you the theory--it immerses you in real-world, technical challenges, equipping you with the skills to tackle identity guardrails, cloud storage, virtual machines, automation, remote management, and more. Dive into critical issues like Identity and Access Management (IAM) and securing S3 Buckets and emerge with the confidence to mitigate risks during lift-and-shift transitions.
SEC488 goes beyond conventional learning. You'll engage in dynamic, hands-on labs within actual cloud service provider (CSP) environments on AWS and Azure. Experience the thrill of live-fire exercises and a Capstone Capture the Flag event that puts your skills to the test. Learn to effectively limit and mitigate the impact of cloud security breaches and prevent costly disruptions like service shutdowns or unauthorized bitcoin mining operations. This course not only enhances compliance and protects your organization's reputation and assets, but also boosts employee retention and team knowledge. Elevate your cloud security expertise with SEC488 and become the defender your organization relies on.
"Solid content, good pace, and great explanations, plus it's helpful to see how all of these cloud and security concepts can be integrated and applied in real life." Craig Harris, SMBC
What Is Cloud Security?
Cloud security involves adapting traditional security practices to the public cloud environment by leveraging the shared responsibility model. It requires applying vendor-provided controls to protect applications, data, and brand within the cloud environment. Effective cloud security includes Identity and Access Management (IAM), data protection, network security, and continuous monitoring to safeguard cloud resources and maintain a strong security posture.
Business Takeaways
- Minimize Your Cloud Risk: Proactively secure your cloud environments to significantly reduce vulnerabilities.
- Safeguard Computational Resources: Ensure your budget remains intact by protecting your computing power.
- Enhance Compliance: Elevate your cloud security compliance to meet and exceed regulatory standards.
- Boost Efficiency: Leverage automation to streamline operations and enhance overall productivity.
- Strengthen Workforce Retention: Enhance organizational security, leading to increased employee satisfaction and retention.
- Protect Brand Reputation: Maintain and enhance your organization's brand by securing your cloud operations.
- Build Customer Trust: Increase customer confidence with robust and reliable cloud security measures.
- Uncover Cloud Security Weaknesses: Gain the expertise to identify gaps in your organization's cloud security posture.
- Master Cloud Security Communication: Confidently discuss cloud security concepts with both technical experts and leadership.
- Guide Through Cloud Challenges: Skillfully navigate your organization through the evolving landscape of cloud security issues and opportunities.
- Identify Cloud Service Risks: Recognize and assess risks associated with different cloud service provider (CSP) offerings.
- Choose Effective Security Controls: Select the right security measures for various cloud network security architectures.
- Critically Evaluate CSPs: Assess CSPs based on their security documentation, controls, and audit reports.
- Leverage Leading CSP Services: Use services from top CSPs like AWS, Azure, and GCP with confidence.
- Safeguard Sensitive Information: Protect secrets and sensitive data within cloud environments.
- Ensure Accountability with Cloud Logging: Utilize cloud logging capabilities to establish event accountability.
- Assign Risk Control Responsibility: Determine risk control ownership based on CSP deployment and service models.
- Evaluate CSP Trustworthiness: Assess the reliability of CSPs using their security documentation, features, and third-party attestations.
- Secure CSP Management Access: Effectively manage secure access to CSP management consoles and environments.
- Conduct Comprehensive Pen Testing: Perform penetration testing following AWS and Azure guidelines to secure full-stack cloud applications.
- Implement Native Network Controls: Deploy native network security controls in AWS and Azure.
Just like advanced flight simulators for commercial pilots, the SEC488 lab environment immerses students in practical, real-world exercises to apply the theory and skills learned during lectures. With 15 hours dedicated entirely to hands-on keyboard experiences, students gain the ability to "fly the plane" rather than just read the manual. Students rave about the SEC488 exercises because they are effective! Continuously updated to match vendor changes, the SEC488 labs are resilient, and students get extended access to lab content via the course lab workbook.
This multicloud, immersive lab environment features a variety of cloud resources such as virtual machines, storage services, and security tools, all configured to simulate real-world scenarios. This setup gives students comprehensive exposure to different cloud service providers. The "choose your own adventure" format allows students to select their preferred cloud vendor for each lab, whether it's AWS or Azure, across 20 labs and a gamified capture the flag in Section 6.
Labs offer a vital opportunity to apply theoretical knowledge in a controlled setting, helping students solidify their understanding of cloud security principles. By actively engaging in these repeatable labs, students can practice and hone their skills, ensuring they are well-prepared to tackle cloud security challenges in their organizations from day one back in the office.
"As a relative cloud newb, this course has really allowed me to understand how to best secure the cloud. My day to day role doesn't allow for hands on work so I've particularly enjoyed the labs." - Will Hotard, State of Louisiana OTS
"The labs serve to both break up a fairly intensive academic upskilling, and also to teach you how to apply the knowledge correctly and safely, allowing you to secure your cloud environment with confidence and ease." - Matt Hunter, National E-Crime Team
"I appreciate the thorough information, and how it is delivered. Plus the steps are very helpful and easy to follow." - Taylor Ripplinger, Encompass Health
Syllabus Summary
- Section 1: Utilize Identity and Access Management (IAM) to secure cloud accounts and implement least privilege access.
- Section 2: Focus on securing compute instances and managing configurations within cloud environments.
- Section 3: Learn to protect data through a variety of stringent protection mechanisms.
- Section 4: Explore network security controls and logging to monitor and manage cloud data flows.
- Section 5: Understand compliance requirements, perform penetration testing, and respond to incidents in the cloud.
- Section 6: Apply all learned skills in a comprehensive CloudWars challenge to reinforce cloud security concepts.
- Evolution of SIEM in the Cloud, Webcast
- Least Privilege - An Adventure in Third-Party Cloud Account Access, Hands-On Workshop
- Cloud VM Deployment and Hardening, Hands-On Workshop
- Protecting Cloud Assets and Improving Security, Hands-On Workshop
- Avoiding Data Disasters: Techniques to Identify and Address Cloud Storage Misconfigurations, Hands-On Workshop
- Cloud Attacks: What's Old is New - Part 1, Blog
- Cloud Attacks: What's New is New - Part 2, Blog
- Beyond the Foundations: Diving into IAM in AWS, Blog
- Building Strong Foundations: Exploring IaC for Cloud IAM, Blog
- AWS and Azure provisioned accounts
- MP3 audio files of the complete course lectures
- Printed and Electronic courseware
- Extended access to the course's 20+ lab exercises
Depending on your professional goals and direction, SANS offers a number of follow-on courses to SEC488.
Cloud Security Analyst
- SEC510: Cloud Security Controls and Mitigations | GPCS
- SEC541: Cloud Security Threat Detection | GCTD
- SEC510: Cloud Security Controls and Mitigations | GPCS
- SEC540: Cloud Security and DevSecOps Automation | GCSA
- SEC549: Cloud Security Architecture | GCSA
- LDR520: Cloud Security for Leaders
- LDR520: Cloud Security for Leaders
Enquire
Start date | Location / delivery | |
---|---|---|
27 Jan 2025 | Virtual | Book now |