Cloud 101CircleEventsBlog
Take our State of SaaS Security Survey 2024 by February 29 to shape the future of secure SaaS usage!

Cloud Infrastructure Security Training

Critical components for every cloud adopting organization.
Cloud Infrastructure Security

CSA’s Cloud Infrastructure Security Training helps make cloud security knowledge more accessible by providing a high-level introduction on some of the most critical cloud security topics. Based on research by CSA’s expert working groups, these virtual self-paced courses build upon an existing baseline of cybersecurity knowledge and introduce learners to key aspects of cloud security that may be unfamiliar. 

Cloud Infrastructure Security Trainings focus on a specific area of cloud computing and are designed to be succinct, one-hour courses composed of up to several units each and a five-question knowledge check at the end. After successfully completing each course, learners will receive a certificate for 1-course hour that may be submitted for possible Continuing Educational Credits. These courses are only offered in English.

Recommended Prerequisites: This course doesn't require prerequisites.

What are the benefits?

Develop an understanding of fundamental cloud security concepts.
Improve career prospects and become an invaluable asset.
Foster a culture of shared cloud security resposibilty.
Reduce the risk of digital breaches due to human error.
Stay updated on ergerging cloud security threats and best practices.
Save time with each course which takes roughly one hour to complete.
Spend less on training with a purchase point of $99 per course.
Earn Continuing Educational Credits for professional development and certification requirements.

Who should enroll in this training?

C-Suite (CEO, CTO, CISO, CIO)
Cybersecurity Analysts
Managers and Decision Makers
Security Engineers and Architects
Security Administrators
Compliance Managers
System Engineers
Developers

Cloud Infrastructure Security Courses

Each 1 hour course provides an introduction to a key aspect of cloud security.
Cloud Key Management Foundations
Cloud Key Management Foundations
Cloud Key Management Foundations II
Cloud Key Management Foundations II
Container Architecture Risks & Mitigations
Container Architecture Risks & Mitigations
DevSecOps: Automation
DevSecOps: Automation
DevSecOps: Bridging Compliance & Development
DevSecOps: Bridging Compliance & Development
DevSecOps: Collective Responsibility
DevSecOps: Collective Responsibility
DevSecOps: Pragmatic Implementation
DevSecOps: Pragmatic Implementation
Microservices & Container Lifecycle Management & Assurance
Microservices & Container Lifecycle Management & Assurance
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals II
Microservices & Containers Fundamentals II
Top Threats
Top Threats
Read the FAQ

Related Resources

View additional materials helpful to each course by selecting a course:
Key Management in Cloud Services
Key Management in Cloud Services
Recommendations for Adopting a Cloud-Native Key Management Service
Recommendations for Adopting a Cloud-Native Key...
Cloud Key Management System with External Origin Key
Cloud Key Management System with External Origi...
Best Practices for Implementing a Secure Application Container Architecture
Best Practices for Implementing a Secure Applic...
Challenges in Securing Application Containers and Microservices
Challenges in Securing Application Containers a...
Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microse...
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven

Related Videos

Explore webinars on the topics of the courses:
The Need for Intelligence-Driven Incident Response
The Need for Intelligence-Driven Incident Response
December 7 | Online
Using Threat Intelligence to Break Down Security Silos
Using Threat Intelligence to Break Down Security Silos
November 30 | Online
Security Leaders Debate: Cybersecurity Predictions for 2023
Security Leaders Debate: Cybersecurity Predictions for 2023
November 1 | Online
Threat Detection in AWS: Cloud security secrets from my time at AWS
Threat Detection in AWS: Cloud security secrets from my time at AWS
November 18 | Online
Help us develop trainings by joining a research Working Group