We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Cloud Security Specialist

Cloud Security Specialist

Cloud Security Specialists are responsible for safeguarding an organization's cloud-based systems, networks, and data. They help to design, implement and maintain security protocols and policies for cloud-based applications. These professionals ensure data protection across cloud platforms like AWS, Azure, and Google Cloud Platform.

Course duration Duration: 10 hours

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner validates foundational, high-level understanding of AWS Cloud, services, and terminology. This is a good starting point on the AWS Certification journey for individuals with no prior IT or cloud experience switching to a cloud career or for line-of-business employees looking for foundational cloud literacy.

Course duration Duration: 7 hours, 29 min.

CompTIA Cloud Essentials+

CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.

Course duration Duration: 8 hours, 15 min.

AWS SysOps Administrator Associate

The Amazon Web Services Certified SysOps Administrator (ACSA) certification is designed for professionals responsible for supporting deployments running in the AWS cloud.

Course duration Duration: 14 hours, 29 min.

CompTIA CASP+ (CAS-004)

CASP+ covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The certification is designed for advanced security professionals that have knowledge of Security+

Course duration Duration: 26 hours, 18 min.

CompTIA Security+ (SY0-701)

This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification

Course duration Duration: 30 hours, 19 min.

AWS Certified Developer - Associate

The AWS Certified Developer Exam is intended for individuals that are familiar with software development and are looking to utilize AWS services to create scalable, fault tolerant applications.

Course duration Duration: 17 hours, 48 min.

CompTIA Cloud+ (CV0-004)

Immerse yourself in the expansive world of cloud computing with our CompTIA Cloud+ course, designed to equip you with up-to-date skills and knowledge needed to excel in the 2024 CompTIA Cloud+ exam.

Course duration Duration: 16 hours, 53 min.

Google Cloud Platform - Associate Cloud Engineer

The Google Cloud Platform - Associate Cloud Engineer course targets those individuals looking to learn to deploy applications in the Google Cloud Platform.

Course duration Duration: 8 hours, 3 min.

AZ-800: Administering Windows Server Hybrid Core Infrastructure

AZ-800: Administering Windows Server Hybrid Core Infrastructure certification focuses on managing and securing hybrid environments using Windows Server.

Course duration Duration: 28 hours, 30 min.

AZ-801: Configuring Windows Server Hybrid Advanced Services

AZ-801: Configuring Windows Server Hybrid Advanced Services certification teaches advanced management of hybrid environments. Learn to configure security, troubleshoot, and optimize workloads across on-premises and cloud-based Windows Server infrastructure.

Course duration Duration: 15 hours

Microsoft Azure Administrator (AZ-104)

AZ-104: Microsoft Azure Administrator certification validates skills in managing cloud services, including compute, storage, networking, and security in Microsoft Azure.

Course duration Duration: 27 hours, 25 min.

AZ-140: Microsoft Azure Virtual Desktop

AZ-140: Microsoft Azure Virtual Desktop certification focuses on planning, delivering, and managing virtual desktop experiences using Azure.

Course duration Duration: 8 hours, 30 min.

Developing Solutions for Microsoft Azure (AZ-204)

AZ-204: Developing Solutions for Microsoft Azure certification validates expertise in designing, building, and maintaining cloud applications.

Course duration Duration: 14 hours, 30 min.

Designing Microsoft Azure Infrastructure Solutions (AZ-305)

AZ-305: Designing Microsoft Azure Infrastructure Solutions certification validates skills in creating scalable and secure cloud infrastructure.

Course duration Duration: 18 hours, 45 min.

AZ-500: Microsoft Azure Security Technologies

AZ-500: Microsoft Azure Security Technologies certification focuses on managing security for Azure environments.

Course duration Duration: 15 hours

Mastering Microsoft Endpoint Manager and Intune

Master Microsoft Endpoint Manager and Intune to streamline device management and enhance security.

Course duration Duration: 3 hours

Hands-on with SCCM

The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices.

Course duration Duration: 17 hours

Microsoft Sentinel Skills

Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.

Course duration Duration: 8 hours

Networking Fundamentals

Learn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.

Course duration Duration: 7 hours, 43 min.

Implement Enterprise Splunk for Your Business

Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.

Course duration Duration: 2 hours

Getting Your Data Into Splunk Effortlessly

Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.

Course duration Duration: 2 hours

Amping Up Splunk with Advanced Admin

Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.

Course duration Duration: 1 hour, 39 min.

Splunk Enterprise Administration Fundamentals

Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.

Course duration Duration: 5 hours, 31 min.

Palo Alto Networks Cybersecurity Fundamentals (PCCSA)

Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.

Course duration Duration: 6 hours, 47 min.

Hands-on with Cisco Meraki Wireless Access Points

Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points.

Course duration Duration: 2 hours, 30 min.

AWS Certified Solutions Architect - Associate (SAA-CO3)

Often the first technical AWS certification exam attempted by IT professionals, the AWS Solutions Architect - Associate certification addresses the skills and knowledge required to design secure, resilient, high-performing, and cost-optimized architectures in AWS.

Course duration Duration: 16 hours, 30 min.

Linux in the Cloud

The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.

Course duration Duration: 5 hours, 20 min.

Becoming a Linux Server Admin

The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.

Course duration Duration: 12 hours, 15 min.

Red Hat Enterprise Linux 8

The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform.

Course duration Duration: 9 hours, 15 min.

ISC2 Certified in Cybersecurity: Cybersecurity Fundamentals

Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam

Course duration Duration: 7 hours

VMware VCP-DCV (Updated for vSphere 7)

This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.

Course duration Duration: 18 hours, 30 min.

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Course duration Duration: 40 minutes

How to Protect OT the OT Way

Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.

Course duration Duration: 30 minutes

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Course duration Duration: 74 hours, 15 min.

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Uncovering Azure's Silent Threats

Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.

Course duration Duration: 50 minutes

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Course duration Duration: 25 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

Establishing Security in a Multi-Cloud Environment

Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.

Course duration Duration: 20 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button