f.hubspotusercontent20.net...4d;2@=?b;1;18@[email protected]@;1@b@d;8d.9@?5b.;2=;[email protected]/7e,b257@-9,5?@?b185+@...

1

Transcript of f.hubspotusercontent20.net...4d;2@=?b;1;18@[email protected]@;1@b@d;8d.9@?5b.;2=;[email protected]/7e,b257@-9,5?@?b185+@...

Page 1: f.hubspotusercontent20.net...4d;2@=?b;1;18@=b652@3.b-5@;1@b@d;8d.9@?5b.;2=;-@-.a/7e,b257@-9,5?@?b185+@ c5b=/?;18@?5b.@(4@;1c?b2=?/-=/?5+@?5b.@25-/?;=9@=aa.2+@b17@?5b.@-9,5?b==b-62&@*2@

Cloud Security Battle Path

Battle Path Overview

This training takes place in a highly realistic cloud-based cyber range,

featuring real IT infrastructure, real security tools, and real cyberattacks. As

part of the Battle Path, you’ll complete training exercises and related

challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce

Badge to validate and promote your achievements.

Whether you’re just beginning your career in cybersecurity or are mastering

new skills needed to advance it, each path provides impactful hands-on

training to take your career to the next level. Purchase Battle Paths together

with a Battle Skills license or individually to match your specific training goals.

Effective training is critical to any security professional’s success. With

RangeForce’s Threat Hunter Battle Path, you’ll have quick access to a

multiweek training program designed to develop your security skills.

© Copyright — Rangeforcerangeforce.com

[email protected]

(877) 716-4342

rangeforce.com

Course 1

Cloud Security Overview

Shared Responsibilities

IAM:Overview

Course 5

AWS: Deleting Account Access Keys

AWS: IAM Roles

AWS:IAM Policies

Course 6

Azure Securityfor the SOC

Azure: Understanding Attack Surface

Azure: MonitoringCloud Processes

Course 7

Azure: Investigationsin the Cloud

Azure: Security Center

Azure: Public Permissions

Course 8

Containing Lateral Movement in the Cloud

Isolating Attacks

Cloud Cryptomining Attacks

Course 9

Log Management using Splunk

Log Management using QRadar

Misconfigurations

Course 10

EDR in the Cloud

Hybrid Cloud Security Concepts

Cloud Governance, Risk, and Compliance

Course 4

AWS Overview

AWS: IAM Stack

AWS: Enabling MFA

AWS: Enabling CloudTrail

Course 3

IAM: Principle of Least Privilege

Data Deletion

Data Encryption

Access Control

Course 2

IAM:Managing Users

IAM: Managing Roles

IAM: Strong Passwords

Cloud Access Security Broker Introduction