Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC510: Cloud Security Controls and Mitigations

SEC510Cloud Security
  • 5 Days (Instructor-Led)
  • 38 Hours (Self-Paced)
Course created by:
Brandon EvansEric Johnson
Brandon Evans & Eric Johnson
SEC510: Cloud Security Controls and Mitigations
Course created by:
Brandon EvansEric Johnson
Brandon Evans & Eric Johnson
  • GIAC Public Cloud Security (GPCS)
  • 38 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 24 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Learn to prevent cloud incidents from becoming breaches using controls that matter. Analyze real case studies and implement the exact strategies that would have mitigated them.

Course Overview

Protecting multicloud environments is tough but essential. Default controls often fall short, and what works for one cloud service provider (CSP) may fail in another. SEC510 delivers advanced training in attack-driven controls over compliance and teaches practical strategies to reduce risk and defend critical cloud assets.

What You’ll Learn

  • Make informed choices across AWS, Azure, and GCP with deep dives into their Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) offerings
  • Learn from real-world case studies of attacks impacting even mature cloud security programs
  • Test and validate how security controls actually work instead of trusting vendor documentation
  • Build layered Identity and Access Management (IAM) with advanced conditions, and integrate identity into network security
  • Automate encryption and compliance checks at scale
  • Acquire techniques to prevent, mitigate, and recover from ransomware
  • Secure modern environments, including Function as a Service (FaaS) architecture, cross-cloud setups, and Infrastructure as Code (IaC)-based deployments

Business Takeaways

  • Reduce the attack surface of your organization's cloud environments
  • Prevent incidents from becoming breaches through defense in-depth
  • Control the confidentiality, integrity, and availability of data in the Big 3 CSPs
  • Increase use of secure automation to keep up with the speed of today's business environment
  • Resolve unintentional access to sensitive cloud assets
  • Reduce the risk of ransomware impacting your organization's cloud data

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC510: Cloud Security Controls and Mitigations.

Section 1Cloud Identity and Access Management

SEC510 begins with cloud breach trends and the challenges of multicloud. Students explore IAM and machine identity risks, practice real-world attacks, and use tools like IAM analyzers to detect Broken Access Control. The section ends with strategies to prevent privilege escalation.

Topics covered

  • Cloud Identity and Access Management
  • Cloud Managed Identity and Metadata
  • Broken Access Control and Policy Analysis
  • IAM Privilege Escalation

Labs

  • IAM Fundamentals
  • Virtual Machine Credential Exposure
  • Broken Access Control and Policy Analysis
  • IAM Privilege Escalation
  • Bonus Challenges (Section 1)

Section 2Cloud Virtual Networks

Section 2 focuses on securing cloud infrastructure and data by locking down network access. Students learn to restrict traffic, secure VMs, use private endpoints for PaaS, prevent RCE with data exfiltration, and analyze flow logs to detect malicious activity across all three major clouds.

Topics covered

  • Cloud Virtual Networks
  • Protecting Public Virtual Machines
  • Private Endpoint Security and Abuse
  • Enabling Traffic Monitoring

Labs

  • Control Ingress Traffic
  • Protecting Public Virtual Machines
  • Control Egress Traffic with Private Endpoints
  • Remote Code Execution via Private Endpoint Abuse
  • Bonus Challenges (Section 2)

Section 3Cloud Data Security

Section 3 focuses on cloud data security, covering encryption, secure storage, ransomware defense, and access control. Students explore key management, in-transit encryption, and advanced storage protections like file versioning, data retention, and detecting sensitive data exposure.

Topics covered

  • Cryptographic Key Management
  • Encryption with Cloud Services
  • Cloud Storage Platforms
  • Sensitive Data Exfiltration
  • Sensitive Data Detection

Labs

  • Detect and Prevent Improper Key Usage
  • Encrypt All the Things!
  • Recover From Ransomware
  • Sensitive Data Detection and Exfiltration
  • Bonus Challenges (Section 3)

Section 4Cloud Application Services and User Security

Section 4 covers securing cloud app infrastructure and users, starting with serverless FaaS benefits and risks. Students harden real serverless functions, explore Customer Identity and Access Management (CIAM) threats like account takeover via Amazon Cognito, and protect the most critical services in Google Cloud’s Firebase platform.

Topics covered

  • Cloud Serverless Functions
  • Cloud Customer Identity and Access Management
  • Firebase Databases and Google Cloud Implications

Labs

  • Serverless Prey
  • Harden Serverless Functions
  • Using and Exploiting CIAM
  • Broken Firebase Database Access Control
  • Bonus Challenges (Section 4)

Section 5Multicloud and Cloud Security Posture Management

The final section covers multicloud operations, focusing on IAM risks, safe credential use, and Workload Identity Federation. Students automate security checks with CSPM tools, explore trust issues with third-party platforms, and study how to mitigate a real cloud security vendor vulnerability using Microsoft Defender as a case study.

Topics covered

  • Multicloud Access Management
  • Cloud Security Posture Management
  • Vendor Integration and Multicloud Security
  • Summary and Additional Resources

Labs

  • Secure Multicloud Integration
  • Automated Benchmarking
  • Prevent Cross-Cloud Confused Deputy
  • Bonus Challenges (Section 5)

Things You Need To Know

Relevant Job Roles

Cloud Security Engineer

Cloud Security

Building security solutions for cloud workflows

Explore learning path

Cloud Security Analyst

Cloud Security

Using cloud security solutions to respond to incidents and enable defenses

Explore learning path

Cybersecurity Architecture (OPM 652)

NICE: Design and Development

Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.

Explore learning path

Technology Research and Development (OPM 661)

NICE: Design and Development

Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Explore learning path

Enterprise Architecture (OPM 651)

NICE: Design and Development

Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.

Explore learning path

Secure Systems Development

NICE: Design and Development

Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.

Explore learning path

Security Control Assessment (OPM 612)

NICE: Oversight and Governance

Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Brandon Evans
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Singapore, SG & Virtual (live)

    Instructed by Brandon Evans
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,900 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Brandon Evans
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Boston, MA, US & Virtual (live)

    Instructed by Simon Vernon
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Simon Vernon
    Date & Time
    Fetching schedule..View event details
    Course price
    £7,160 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by Brandon Evans
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Denver, CO, US & Virtual (live)

    Instructed by Brandon Evans
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Brandon Evans
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,230 EUR*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 12

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources