This program is designed for individuals looking to take a deep dive into cloud security and understand the safety protocols that are critical to cloud computing. It is ideal for:
Engineers and IT professionals seeking to understand the foundational concepts of cloud computing and the types of technologies used in cloud computing and security, and align their efforts with business requirements and priorities.
Early to mid-level cybersecurity professionals looking to apply the concepts of cloud computing security to a virtual cloud environment and facilitate the smooth migration of their organization’s systems to the cloud, with the necessary security measures and risk management plans.
IT/cybersecurity consultants aiming to offer strategic and feasible long-term IT-based solutions and ensure their teams are working optimally and keeping their skills up to date.
The need for professionals to manage and secure their organization’s data in the cloud has intensified. Throughout this six-week program, you will:
Explore the foundational concepts of cloud computing, including the history and development of the cloud platform
Identify foundational technologies used in cloud computing and security
Learn to secure your organization's systems in the cloud amid the growing adoption of hybrid work models
Assess policies and control systems that govern cloud services
Learn to apply access management practices to identification, authentication, and authorization management
Apply concepts of cloud computing security to a virtual cloud environment
Gain experience using cloud computing security tools, and develop the skills to apply them in your own organization
The Cloud Security program provides a true hands-on experience, with activities built into each module that enable you to create a virtual cloud environment by applying the concepts presented while also showcasing your work in the cloud.
Live sessions with faculty
Discussions, crowdsources, knowledge checks and quizzes
Dedicated program support team
Live office hours with a program leader
Timely curriculum
Moderated discussion groups
Immersive learning with real-world activities
Video lectures
Hands-on lab assignments applying best practices
Peer-to-peer learning and feedback
Adjunct Assistant Professor and Computer Scientist
Dean Christakos has extensive research experience in fields from wearable computing and embedded systems to security architecture and big data analytics. With research work in...
Upon successful completion of the program, participants will be awarded a verified digital certificate by NYU Tandon.
Didn't find what you were looking for? Write to us at learner.success@emeritus.org or Schedule a call with one of our Program Advisors or call us at +1 680 205 8507 (US) / +44 145 370 2595 (UK) / +65 3163 6129 (SG)
Flexible payment options available.
Starts On