Cloud 101CircleEventsBlog
Take the Understanding Data Risk Survey to help shape the future of data security!

Cloud Infrastructure Security Training

Critical components for every cloud adopting organization.
Cloud Infrastructure Security

CSA’s Cloud Infrastructure Security Training helps make cloud security knowledge more accessible by providing a high-level introduction on some of the most critical cloud security topics. Based on research by CSA’s expert working groups, these virtual self-paced courses build upon an existing baseline of cybersecurity knowledge and introduce learners to key aspects of cloud security that may be unfamiliar. 

Cloud Infrastructure Security Trainings focus on a specific area of cloud computing and are designed to be succinct, one-hour courses composed of up to several units each and a five-question knowledge check at the end. After successfully completing each course, learners will receive a certificate for 1-course hour that may be submitted for possible Continuing Educational Credits. These courses are only offered in English.

Recommended Prerequisites: This course doesn't require prerequisites.

What are the benefits?

Develop an understanding of fundamental cloud security concepts.
Improve career prospects and become an invaluable asset.
Foster a culture of shared cloud security resposibilty.
Reduce the risk of digital breaches due to human error.
Stay updated on ergerging cloud security threats and best practices.
Save time with each course which takes roughly one hour to complete.
Spend less on training with a purchase point of $99 per course.
Earn Continuing Educational Credits for professional development and certification requirements.

Who should enroll in this training?

C-Suite (CEO, CTO, CISO, CIO)
Cybersecurity Analysts
Managers and Decision Makers
Security Engineers and Architects
Security Administrators
Compliance Managers
System Engineers
Developers

Cloud Infrastructure Security Courses

Each 1 hour course provides an introduction to a key aspect of cloud security.
Container Architecture Risks & Mitigations
Container Architecture Risks & Mitigations
Microservices & Container Lifecycle Management & Assurance
Microservices & Container Lifecycle Management & Assurance
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals II
Microservices & Containers Fundamentals II
DevSecOps: Automation
DevSecOps: Automation
DevSecOps: Bridging Compliance & Development
DevSecOps: Bridging Compliance & Development
DevSecOps: Collective Responsibility
DevSecOps: Collective Responsibility
DevSecOps: Pragmatic Implementation
DevSecOps: Pragmatic Implementation
Cloud Key Management Foundations
Cloud Key Management Foundations
Cloud Key Management Foundations II
Cloud Key Management Foundations II
Top Threats
Top Threats
Introduction to Generative AI & Prompt Engineering
Introduction to Generative AI & Prompt Engineering
Read the FAQ

Related Resources

View additional materials helpful to each course by selecting a course:
Recommendations for Adopting a Cloud-Native Key Management Service
Recommendations for Adopting a Cloud-Native Key...
Cloud Key Management System with External Origin Key
Cloud Key Management System with External Origi...
Key Management in Cloud Services
Key Management in Cloud Services
Best Practices for Implementing a Secure Application Container Architecture
Best Practices for Implementing a Secure Applic...
Challenges in Securing Application Containers and Microservices
Challenges in Securing Application Containers a...
Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microse...
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven

Related Videos

Explore webinars on the topics of the courses:
Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?
Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?
November 6 | Online
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
The Need for Intelligence-Driven Incident Response
The Need for Intelligence-Driven Incident Response
December 7 | Online
Using Threat Intelligence to Break Down Security Silos
Using Threat Intelligence to Break Down Security Silos
November 30 | Online
Help us develop trainings by joining a research Working Group