
Expert Guidance
Learn from industry experts with hands-on experience in cloud security practices.

Real-world Scenarios
Explore real-world case studies to understand practical implementations of cloud security measures.

Interactive Learning
Engage in interactive sessions and practical exercises to reinforce your understanding.
About the Course
Embrace the future of cloud security with our immersive 3-module course. Addressing the pressing need for robust cloud security measures, this course equips you with the knowledge and skills to safeguard your digital assets effectively. Dive into the intricacies of cloud security and emerge as a certified expert in the field. Take the first step towards securing your digital infrastructure today! Enroll now and elevate your cloud security game.

Meet Your Instructor
Hi, I'm [Your Name], your guide on this cloud security journey. With years of experience in the cybersecurity domain, I am passionate about sharing my expertise to empower individuals like you. Join me in unraveling the complexities of cloud security and mastering the art of protecting vital digital assets. Let's embark on this transformative learning experience together.
Curriculum
-
1
Start Here
-
(Included in full purchase)
Cloud Security Course Program Overview
-
(Included in full purchase)
Arcitura Cloud Security Training & Certification Guide
-
(Included in full purchase)
Cloud Security Symbol Legend Poster
-
(Included in full purchase)
-
2
Module 7: Fundamental Cloud Security
-
(Included in full purchase)
Module 7 Overview
-
(Included in full purchase)
Module 7 Mind Map Poster
-
(Included in full purchase)
Lesson 1: Cloud Security Basics
-
(Included in full purchase)
Video Lesson 1: Cloud Security Basics
-
(Included in full purchase)
Exercise 7.1
-
(Included in full purchase)
Exercise 7.2
-
(Included in full purchase)
Lesson 2: Cloud Security Threats
-
(Included in full purchase)
Video Lesson 2: Cloud Security Threats
-
(Included in full purchase)
Exercise 7.3
-
(Included in full purchase)
Lesson 3: Secure Network Connection Mechanisms
-
(Included in full purchase)
Video Lesson 3: Secure Network Connection Mechanisms
-
(Included in full purchase)
Exercise 7.4
-
(Included in full purchase)
Lesson 4: Secure Network Connection Design Patterns
-
(Included in full purchase)
Video Lesson 4: Secure Network Connection Design Patterns
-
(Included in full purchase)
Exercise 7.5
-
(Included in full purchase)
Lesson 5: Network Protection Mechanisms
-
(Included in full purchase)
Video Lesson 5: Network Protection Mechanisms
-
(Included in full purchase)
Lesson 6: Network Protection Design Patterns
-
(Included in full purchase)
Video Lesson 6: Network Protection Design Patterns
-
(Included in full purchase)
Exercise 7.6
-
(Included in full purchase)
Lesson 7: Cloud IAM Mechanisms
-
(Included in full purchase)
Video Lesson 7: Cloud IAM Mechanisms
-
(Included in full purchase)
Exercise 7.7
-
(Included in full purchase)
Lesson 8: Cloud IAM Design Patterns
-
(Included in full purchase)
Video Lesson 8: Cloud IAM Design Patterns
-
(Included in full purchase)
Exercise 7.8
-
(Included in full purchase)
Lesson 9: Trust Assurance Mechanisms
-
(Included in full purchase)
Video Lesson 9: Trust Assurance Mechanisms
-
(Included in full purchase)
Exercise 7.9
-
(Included in full purchase)
Lesson 10: Trust Assurance Design Patterns
-
(Included in full purchase)
Video Lesson 10: Trust Assurance Design Patterns
-
(Included in full purchase)
-
3
Module 8: Advanced Cloud Security
-
(Included in full purchase)
Module 8 Overview
-
(Included in full purchase)
Cloud Security Module 8 Mind Map Poster
-
(Included in full purchase)
Lesson 1: VM Platform Protection Mechanisms
-
(Included in full purchase)
Video Lesson 1: VM Platform Protection Mechanisms
-
(Included in full purchase)
Exercise 8.1
-
(Included in full purchase)
Lesson 2: VM Platform Protection Design Patterns
-
(Included in full purchase)
Video Lesson 2: VM Platform Protection Design Patterns
-
(Included in full purchase)
Exercise 8.2
-
(Included in full purchase)
Lesson 3: Data-Oriented Mechanisms and Design Patterns
-
(Included in full purchase)
Video Lesson 3: Data-Oriented Mechanisms and Design Patterns
-
(Included in full purchase)
Exercise 8.3
-
(Included in full purchase)
Lesson 4: Access Control Mechanisms
-
(Included in full purchase)
Video Lesson 4: Access Control Mechanisms
-
(Included in full purchase)
Exercise 8.4
-
(Included in full purchase)
Lesson 5: Access Control Design Patterns
-
(Included in full purchase)
Video Lesson 5: Access Control Design Patterns
-
(Included in full purchase)
Exercise 8.5
-
(Included in full purchase)
Lesson 6: Security Compound Patterns
-
(Included in full purchase)
Video Lesson 6: Security Compound Patterns
-
(Included in full purchase)
Lesson 7: Security Establishment Processes
-
(Included in full purchase)
Video Lesson 7: Security Establishment Processes
-
(Included in full purchase)
Exercise 8.6
-
(Included in full purchase)
Exercise 8.7
-
(Included in full purchase)
Exercise 8.8
-
(Included in full purchase)
Lesson 8: Security Lifecycle
-
(Included in full purchase)
Video Lesson 8: Security Lifecycle
-
(Included in full purchase)
Security Compound Patterns Suppement
-
(Included in full purchase)
-
4
Module 9: Cloud Security Lab
-
(Included in full purchase)
Module 9 Overview
-
(Included in full purchase)
Reading Exercise 9.1: IAM in the Cloud Case Study Background
-
(Included in full purchase)
Lab Exercise 9.2: Cloud IAM Environment Setup
-
(Included in full purchase)
Lab Exercise 9.2: Cloud IAM Environment Setup Workbook
-
(Included in full purchase)
Lab Exercise 9.2: Cloud IAM Environment Setup Answer
-
(Included in full purchase)
Lab Exercise 9.3: PKI in the Cloud
-
(Included in full purchase)
Lab Exercise 9.3: PKI in the Cloud Workbook
-
(Included in full purchase)
Lab Exercise 9.3: PKI in the Cloud Answer
-
(Included in full purchase)
Reading Exercise 9.4: Budget Bank Data Breach
-
(Included in full purchase)
Lab Exercise 9.5: Cloud Data Encryption and Key Management
-
(Included in full purchase)
Lab Exercise 9.5: Cloud Data Encryption and Key Management Workbook
-
(Included in full purchase)
Lab Exercise 9.5: Cloud Data Encryption and Key Management Answer
-
(Included in full purchase)
Reading Exercise 9.6: ACE Telecommunications Move to the Cloud
-
(Included in full purchase)
Lab Exercise 9.7: Cloud Service Protection Architecture
-
(Included in full purchase)
Lab Exercise 9.7: Cloud Service Protection Architecture Workbook
-
(Included in full purchase)
Lab Exercise 9.7: Cloud Service Protection Architecture Answer
-
(Included in full purchase)
Reading Exercise 9.8: Reading Big Box Retailer Breach Case Study Background
-
(Included in full purchase)
Lab Exercise 9.9: Networking Security
-
(Included in full purchase)
Lab Exercise 9.9: Networking Security Workbook
-
(Included in full purchase)
Lab Exercise 9.9: Networking Security Answer
-
(Included in full purchase)
Reading Exercise 9.10: United Health Insurers
-
(Included in full purchase)
Lab Exercise 9.11: Overlapping Trust Boundaries in the Cloud
-
(Included in full purchase)
Lab Exercise 9.11: Overlapping Trust Boundaries in the Cloud Workbook
-
(Included in full purchase)
Lab Exercise 9.11: Overlapping Trust Boundaries in the Cloud Answer
-
(Included in full purchase)
Supplement: Module 9 Mind Map Poster
-
(Included in full purchase)
-
5
Become a Certified Cloud Security Specialist
-
(Included in full purchase)
Step 1 - Take the Self-Test (Optional)
-
(Included in full purchase)
Step 2 - Order the Certification Exam
-
(Included in full purchase)
Step 3 - Pass the Certification Exam
-
(Included in full purchase)
-
6
Add-Ons
-
(Included in full purchase)
Instructor-Led Training
-
(Included in full purchase)
Virtual Coaching
-
(Included in full purchase)
Printed Course Materials
-
(Included in full purchase)
Student Testimonials
Testimonials build trust — fast. Edit this section to show how your product is making a difference and help your audience purchase with confidence.
Text-only testimonials are quick to scan and can highlight the value of your product at a glance.
Las Vegas, NV

The combination of text and imagery make the testimonial feel more personal and credible.
Working mom
Finally, a handbook that makes photography feel simple! It covers everything from camera settings to post-processing in a way that actually makes sense.
Amateur photographer
Ready to Secure Your Cloud Infrastructure?
Take the leap towards becoming a cloud security pro. Enroll now to unlock exclusive access to expert knowledge and practical insights.