Essentials of Cloud Security - Fundamentals, Techniques and Applications

Prevent, detect, and manage threats in the cloud

Download Brochure

Get Your Brochure

Course Dates

STARTS ON

TBD

Course Duration

DURATION

6 Weeks, Online
4–6 hours per week

Course Fee
Course Fee

For Your Team

Enroll your team and learn with your peers

Learn More

Overview

As more businesses move toward cloud computing, the increased ease of access to and management of data comes with a price: the need for enhanced security to safeguard it. A recent Valtrix survey of IT leaders found that 95% named multicloud as a strategic priority for their businesses in 2022, further increasing the need for security and new ways of thinking about risks.

This program blends a practical approach with theoretical concepts, enabling you to understand the foundations of cloud computing and gain real-world experience using cloud security tools to prevent, detect, and manage cybersecurity threats. Through a curriculum based on the NIST framework, you’ll complete hands-on lab activities and build a virtual cloud environment in which you can apply the concepts presented in the program and showcase your work. Along the way, you’ll learn key cloud security concepts, including storage methods and controls, risk management techniques, access and authentication management, encryption and key management, automation and alert systems, and zero trust policies. Build your competency using cloud security tools, and learn to apply them in your own organization with Cloud Security from NYU Tandon.

69%

of organizations have accelerated their migration to the cloud in the last year.

SOURCE: Foundry Cloud Computing Study 2022

43%

of organizations in a recent study who hadn’t started or were in the early stages of applying security practices across their cloud environments experienced over $660,000 in higher breach costs on average than organizations with mature security across their cloud environments.

SOURCE: IBM report

115%

Predicted a growth in demand for cloud security skills over the next five years.

SOURCE: Burning Glass

Who Is This Program For?

This program is designed for individuals looking to take a deep dive into cloud security and understand the safety protocols that are critical to cloud computing. It is ideal for:

  • Engineers and IT professionals seeking to understand the foundational concepts of cloud computing and the types of technologies used in cloud computing and security, and align their efforts with business requirements and priorities.
  • Early to mid-level cybersecurity professionals looking to apply the concepts of cloud computing security to a virtual cloud environment and facilitate the smooth migration of their organization’s systems to the cloud, with the necessary security measures and risk management plans.
  • IT/cybersecurity consultants aiming to offer strategic and feasible long-term IT-based solutions and ensure their teams are working optimally and keeping their skills up to date.

Program Highlights

The need for professionals to manage and secure their organization’s data in the cloud has intensified. Throughout this six-week program, you will:

  • Explore the foundational concepts of cloud computing, including the history and development of the cloud platform
  • Identify foundational technologies used in cloud computing and security
  • Learn to secure your organization's systems in the cloud amid the growing adoption of hybrid work models
  • Assess policies and control systems that govern cloud services
  • Learn to apply access management practices to identification, authentication, and authorization management
  • Apply concepts of cloud computing security to a virtual cloud environment
  • Gain experience using cloud computing security tools, and develop the skills to apply them in your own organization

Program Syllabus

The Cloud Security program provides a true hands-on experience, with activities built into each module that enable you to create a virtual cloud environment by applying the concepts presented while also showcasing your work in the cloud.

Module 1:

Cloud Foundation Concepts

Learn about the foundational technology and concepts that make cloud computing possible.

  • Identify the history and fundamentals of cloud computing environments
  • Determine the best use of virtualization models
  • Understand the transition from server to serverless
  • Create a container in a cloud computing environment

Hands-On Lab Assignment: Create a Lambda function in AWS, launch an EC2 (Elastic Compute Cloud) instance, and create a S3 (Simple Storage Service) storage bucket.

Module 2:

Cloud Data Storage Controls and Risk Management Basics

  • Identify data technologies in cloud environments
  • Describe security policies and data security technologies
  • Assess risk in a cloud environment
  • Apply security measures to a cloud environment

Hands-On Lab Assignment: Create encryption and key management measures in a cloud environment using Vault.

Module 3:

Identity and Access Management in the Cloud

  • Discuss attributes of access management technologies
  • Compare various authentication and authorization technologies
  • Secure credentials in a cloud environment

Hands-On Lab Assignment: Create authentication measures using GuardDuty.

Module 4:

Cloud Crypto and Key Management

  • Review features of modern cryptography
  • Compare various forms of cryptography used in cloud computing
  • Discuss message integrity and digital signatures
  • Examine encrypting data and using keys in the public cloud
  • Apply key management systems in a cloud environment

Hands-On Lab Assignment: Use Amazon's Elastic Kubernetes Service (EKS) and automate the deployment and management of containerized applications within AWS.

Module 5:

Automation and DevSecOps

  • Define principles and uses of DevOps
  • Discuss problems with the traditional security model that led to the evolution of DevSecOps
  • Create an automated response in the cloud pipeline for compromised data

Hands-On Lab Assignment: Create an alert in Amazon Web Services.

Module 6:

Zero Trust

  • Examine zero trust principles
  • Evaluate the tenets of zero trust networks
  • Discuss various zero trust architecture models
  • Showcase a simulated cloud environment that uses the tools presented in the program

Final Project: Create a short presentation showcasing the completed labs.

Module 1:

Cloud Foundation Concepts

Learn about the foundational technology and concepts that make cloud computing possible.

  • Identify the history and fundamentals of cloud computing environments
  • Determine the best use of virtualization models
  • Understand the transition from server to serverless
  • Create a container in a cloud computing environment

Hands-On Lab Assignment: Create a Lambda function in AWS, launch an EC2 (Elastic Compute Cloud) instance, and create a S3 (Simple Storage Service) storage bucket.

Module 4:

Cloud Crypto and Key Management

  • Review features of modern cryptography
  • Compare various forms of cryptography used in cloud computing
  • Discuss message integrity and digital signatures
  • Examine encrypting data and using keys in the public cloud
  • Apply key management systems in a cloud environment

Hands-On Lab Assignment: Use Amazon's Elastic Kubernetes Service (EKS) and automate the deployment and management of containerized applications within AWS.

Module 2:

Cloud Data Storage Controls and Risk Management Basics

  • Identify data technologies in cloud environments
  • Describe security policies and data security technologies
  • Assess risk in a cloud environment
  • Apply security measures to a cloud environment

Hands-On Lab Assignment: Create encryption and key management measures in a cloud environment using Vault.

Module 5:

Automation and DevSecOps

  • Define principles and uses of DevOps
  • Discuss problems with the traditional security model that led to the evolution of DevSecOps
  • Create an automated response in the cloud pipeline for compromised data

Hands-On Lab Assignment: Create an alert in Amazon Web Services.

Module 3:

Identity and Access Management in the Cloud

  • Discuss attributes of access management technologies
  • Compare various authentication and authorization technologies
  • Secure credentials in a cloud environment

Hands-On Lab Assignment: Create authentication measures using GuardDuty.

Module 6:

Zero Trust

  • Examine zero trust principles
  • Evaluate the tenets of zero trust networks
  • Discuss various zero trust architecture models
  • Showcase a simulated cloud environment that uses the tools presented in the program

Final Project: Create a short presentation showcasing the completed labs.

The Learning Experience

Icon of a live session with faculty

Live sessions with faculty

Icon of discussions crowdsources and quizzes

Discussions, crowdsources, knowledge checks and quizzes

Icon of a dedicated program support team

Dedicated program support team

Icon of live office hours with a program leader

Live office hours with a program leader

Icon of timely curriculum

Timely curriculum

Icon of moderated discussion groups

Moderated discussion groups

Icon of immersive learning with real-world activities

Immersive learning with real-world activities

Icon of video lecture

Video lectures

Icon of Hands-on lab assignments applying best practices

Hands-on lab assignments applying best practices

Icon of Peer-to-peer learning and feedback

Peer-to-peer learning and feedback

Program Faculty

Profile picture of program faculty, Adjunct Assistant Professor and Computer Scientist - Dean Christakos

Dean Christakos

Adjunct Assistant Professor and Computer Scientist

Dean Christakos has extensive research experience in fields from wearable computing and embedded systems to security architecture and big data analytics. With research work in securing mobile and wireless networks, he joined The Johns Hopkins University Applied Physics Laboratory, where he worked with clients at the Department of Defence to build more secure architectures to secure their networks and analytics results... More info

Certificate

Certificate

Upon successful completion of the program, you will be awarded a verified digital certificate of participation from NYU Tandon.

Download Brochure

FAQs

  • How do I know if this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow-up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page, as well as in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at the ID mentioned above.


    Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.


    What is the typical class profile?

    More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.


    What other dates will this program be offered in the future?

    Check back to this program web page or email us to inquire if future program dates or the timeline for future offerings have been confirmed yet.

  • How much time is required each week?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page.


    How will my time be spent?

    We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:



    • Engaging with recorded video lectures from faculty
    • Attending webinars and office hours, as per the specific program schedule
    • Reading or engaging with examples of core topics
    • Completing knowledge checks/quizzes and required activities
    • Engaging in moderated discussion groups with your peers
    • Completing your final project, if required

    The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please email us if you need further clarification on program activities.


    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.


    How do I interact with other program participants?

    Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please email us if you need further clarification on any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile.
    The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the online learning platform and all the videos and program materials for 12 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment or technical requirements are there for this program?

    Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.

    Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.

  • Can I still register if the registration deadline has passed?

    Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.


    What is the program fee, and what forms of payment do you accept?

    The program fee is noted at the top of this program web page and usually referenced in the program brochure as well.

    • Flexible payment options are available (see details below as well as at the top of this program web page next to FEE).
    • Tuition assistance is available for participants who qualify. Please email learner.success@emeritus.org.

    What if I don’t have a credit card? Is there another method of payment accepted?

    Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us for details.


    I was not able to use the discount code provided. Can you help?

    Yes! Please email us with the details of the program you are interested in, and we will assist you.


    How can I obtain an invoice for payment?

    Please email us your invoicing requirements and the specific program you’re interested in enrolling in.


    Is there an option to make flexible payments for this program?

    Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.


    How can I obtain a W9 form?

    Please connect with us via email for assistance.


    Who will be collecting the payment for the program?

    Emeritus collects all program payments, provides learner enrollment and program support, and manages learning platform services.

  • What is the program refund and deferral policy?

    For the program refund and deferral policy, please click the link here.

Didn't find what you were looking for? Write to us at learner.success@emeritus.org or Schedule a call with one of our Academic Advisors or call us at +1 680 205 8507 (US) / +44 145 370 2595 (UK) / +65 3163 6129  (SG)

Apply Now

Early registrations are encouraged. Seats fill up quickly!