Cloud 101
Circle
Events
Blog

Micro-Training

Develop a holistic approach to security with this series of short courses on the most critical topics in the cloud.
Micro-Training

CSA’s Micro-Trainings help make cloud security knowledge more accessible by providing a high-level introduction on some of the most critical cloud security topics. Based on research by CSA’s expert working groups, these virtual self-paced courses build upon an existing baseline of cybersecurity knowledge and introduce learners to key aspects of cloud security that may be unfamiliar. 

Micro-Trainings focus on a specific area of cloud computing and are designed to be succinct, one-hour courses composed of up to five units each and a five-question knowledge check at the end. After successfully completing each course, learners will receive a certificate for 1-course hour that may be submitted for possible CPE credits.

Recommended Prerequisites: This course doesn't require prerequisites.

What are the benefits?

Save time. Each course takes around one hour to complete, and do so at your own pace.
Spend less. Each Micro-Training course has a purchase fee of only $50.
Learn more. Build upon your cybersecurity knowledge and learn key aspects of cloud security.

Who should enroll in this training?

C-Suite (CEO, CTO, CISO, CIO)
Cybersecurity Analysts
Managers and Decision Makers
Security Engineers and Architects
Security Administrators
Compliance Managers
System Engineers
Developers

Micro-Training Courses

Each 1 hour Micro-Training course provides an introduction to a key aspect of cloud security.
Cloud Key Management Foundations
Cloud Key Management Foundations
Cloud Key Management Foundations II
Cloud Key Management Foundations II
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals
Microservices & Containers Fundamentals II
Microservices & Containers Fundamentals II
Top Threats
Top Threats
DevSecOps: Collective Responsibility
DevSecOps: Collective Responsibility

Related Resources

View additional materials helpful to each course by selecting a Micro-Training course:
Key Management in Cloud Services
Key Management in Cloud Services
Recommendations for Adopting a Cloud-Native Key Management Service
Recommendations for Adopting a Cloud-Native Key...
Cloud Key Management System with External Origin Key
Cloud Key Management System with External Origi...
Best Practices for Implementing a Secure Application Container Architecture
Best Practices for Implementing a Secure Applic...
Challenges in Securing Application Containers and Microservices
Challenges in Securing Application Containers a...
Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microse...
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven

Related Videos

Explore webinars on the topics of the Micro-Training courses:
Security Leaders Debate: Cybersecurity Predictions for 2023
Security Leaders Debate: Cybersecurity Predictions for 2023
November 1 | Online
Threat Detection in AWS: Cloud security secrets from my time at AWS
Threat Detection in AWS: Cloud security secrets from my time at AWS
November 18 | Online
Something Smells Phishy
Something Smells Phishy
October 18 | Online
Sponsored CSA Research Survey - Trends in Securing Sensitive Data with Privacy Enhancing Technologies
Sponsored CSA Research Survey - Trends in Securing Sensitive Data w...
October 5 | Online
Help us develop trainings by joining a research Working Group