Cloud security

Cloud security
Boost your tech career with the top-rated cloud computing certifications for 2025 and beyond.

November 16, 2024
Stephan Miller
Cloud security
Discover cloud computing's growth, key trends and the importance of cloud security, including challenges and best practices for implementation.

November 29, 2023
Ellen Pincus
Cloud security
Dive into the essentials of cloud infrastructure and its significance in the modern digital world, including components, benefits and security implications.

November 29, 2023
Ellen Pincus
Cloud security
Anyone with the combination of cloud security, privacy and cybersecurity skills is likely to see a bright future full of career opportunities.

August 18, 2023
Drew Robb
Cloud security
APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.

March 20, 2023
Bianca Gonzalez
Cloud security
Cloud, misconfiguration and learning to work across multiple cloud service providers as a cloud security engineer.

February 20, 2023
Joe South
Cloud security
Learn about securing cloud-based applications no matter what cloud platforms you're using.

February 09, 2023
Joe South
Cloud security
An overview of cloud migration projects and the considerations for migrating applications to the cloud.

May 24, 2022
Gilad Maayan
Cloud security
Explore how organizations operating in the Microsoft Azure cloud can use a vendor-prescribed architecture and dedicated security tools to adopt a DevSecOps process.

May 03, 2022
Gilad Maayan
Cloud security
Learn about Amazon's popular cloud service, Amazon Athena, and how to improve visibility and control.

January 26, 2022
Gilad MaayanGet your cloud skills certified!
- Cloud architecture
- Cloud management
- Cloud pentesting
- CSP security features
- And more
In this Series
- Top 11 cloud computing certifications for 2025
- The rise of cloud computing: Trends and predictions
- Understanding the basics of cloud infrastructure: What you need to know
- How cloud security, data privacy, and cybersecurity convergence drives successful careers
- Secure cloud computing: What you need to know
- Working across multiple cloud service providers: CSP security learning path
- Securing cloud-based applications training: What you need to know
- Security risks of cloud migration
- DevSecOps in the Azure Cloud
- Amazon Athena Security: 6 essential tips
- Securing cloud endpoints: What you should know
- AWS security and compliance overview
- CloudGoat walkthrough series: IAM privilege escalation by attachment
- CloudGoat walkthrough series: EC2 server-side request forgery (SSRF)
- CloudGoat walkthrough series: Remote code execution
- CloudGoat walkthrough series: Lambda Privilege Escalation
- Information security strategy for the hybrid and multi-cloud
- CloudGoat walkthrough series: Cloud Breach S3
- CloudGoat walkthrough series: IAM privilege escalation by rollback
- Working with CloudGoat: The “vulnerable by design” AWS environment
- Malicious Amazon Machine Images (AMIs)
- Key findings from Ponemon’s State of Vulnerability Management in the Cloud and On-Premises report
- Cloud Pentesting Certification Boot Camp: The ultimate guide
- Cloud Based IDS and IPS Solutions [Updated 2019]
- AWS Security Monitoring Checklist [Updated 2019]
- Amazon Inspector: A cloud-based vulnerability assessment tool
- System administrator vs. cloud administrator
- 5 key cloud security use cases
- Deep Packet Inspection in the Cloud
- Honeypots in the Cloud
- Biometrics in the Cloud
- Open-Source Intelligence Collection in Cloud Platforms
- How to Safeguard Against the Privacy Implications of Cloud Computing
- AWS Cloud Security for Beginners — Part 2
- AWS Cloud Security for Beginners — Part 1
- AWS Security Monitoring Checklist — Part 2
- Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It
- Controlling the Risks of Cloud-Enabled End-Point Security Products
- The Ultimate Guide to CCSP Certification
- Five Reasons Why Security Professionals Need the Cloud
- Amazon S3 Buckets-Hardening
- Cloud Service Reconnaissance
- Cloud Computing Security: Be Secure Before Moving to Cloud
- Cloud Technology Bringing New Possibilities in Threat Management
- Attacking the Cloud
- Man in the Cloud Attacks: Prevention and Containment
- Cloud originated DDoS attacks
- Where Is Your Data Safer? In the Cloud Or On Premise?
- DDOS Protection for Public Cloud Customers
- Security Barriers in the Adaptation of Cloud Technology
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!