Essentials of Cloud Security - Fundamentals, Techniques and Applications

Prevent, detect, and manage threats in the cloud
Country/Region
Inquiring For
Total Work Experience

Who Is This Program For?

This program is designed for individuals looking to take a deep dive into cloud security and understand the safety protocols that are critical to cloud computing. It is ideal for:

  • Engineers and IT professionals seeking to understand the foundational concepts of cloud computing and the types of technologies used in cloud computing and security, and align their efforts with business requirements and priorities.

  • Early to mid-level cybersecurity professionals looking to apply the concepts of cloud computing security to a virtual cloud environment and facilitate the smooth migration of their organization’s systems to the cloud, with the necessary security measures and risk management plans.

  • IT/cybersecurity consultants aiming to offer strategic and feasible long-term IT-based solutions and ensure their teams are working optimally and keeping their skills up to date.

Program Highlights

The need for professionals to manage and secure their organization’s data in the cloud has intensified. Throughout this six-week program, you will:

  • Explore the foundational concepts of cloud computing, including the history and development of the cloud platform

  • Identify foundational technologies used in cloud computing and security

  • Learn to secure your organization's systems in the cloud amid the growing adoption of hybrid work models

  • Assess policies and control systems that govern cloud services

  • Learn to apply access management practices to identification, authentication, and authorization management

  • Apply concepts of cloud computing security to a virtual cloud environment

  • Gain experience using cloud computing security tools, and develop the skills to apply them in your own organization

Program Syllabus

The Cloud Security program provides a true hands-on experience, with activities built into each module that enable you to create a virtual cloud environment by applying the concepts presented while also showcasing your work in the cloud.

The Learning Experience

LP - NYUT-CLSE - The Learning Experience -1 - Image

Live sessions with faculty

LP - NYUT-CLSE - The Learning Experience -2 - Image

Discussions, crowdsources, knowledge checks and quizzes

LP - NYUT-CLSE - The Learning Experience -3 - Image

Dedicated program support team

LP - NYUT-CLSE - The Learning Experience -4 - Image

Live office hours with a program leader

 LP - NYUT-CLSE - The Learning Experience -5 - Image

Timely curriculum

 LP - NYUT-CLSE - The Learning Experience -6 - Image

Moderated discussion groups

LP - NYUT-CLSE - The Learning Experience -7- Image

Immersive learning with real-world activities

LP - NYUT-CLSE - The Learning Experience -8- Image

Video lectures

LP - NYUT-CLSE - The Learning Experience -9- Image

Hands-on lab assignments applying best practices

LP - NYUT-CLSE - The Learning Experience -10 - Image

Peer-to-peer learning and feedback

Program Faculty

LP - NYUT-CLSE - Program Faculty - Image
Dean Christakos

Adjunct Assistant Professor and Computer Scientist

Dean Christakos has extensive research experience in fields from wearable computing and embedded systems to security architecture and big data analytics. With research work in...

Certificate

Certificate

Upon successful completion of the program, participants will be awarded a verified digital certificate by NYU Tandon.

FAQs

Didn't find what you were looking for? Write to us at learner.success@emeritus.org or Schedule a call with one of our Program Advisors or call us at +1 680 205 8507 (US) / +44 145 370 2595 (UK) / +65 3163 6129 (SG)

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available.

Starts On