Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

LDR520: Cloud Security for Leaders

LDR520Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Jason Lam
Jason Lam
LDR520: Cloud Security for Leaders
Course created by:
Jason Lam
Jason Lam
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 13 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Develop a comprehensive roadmap for cloud security, enhancing your organization's security posture while supporting business transformation and cloud adoption.

Course Overview

LDR520: Cloud Security for Leaders equips security leaders, IT executives, and aspiring cloud security professionals with the critical knowledge they need to develop and implement robust cloud security strategies in today's high-risk environment. This course provides essential frameworks for creating an effective cloud security roadmap and deploying security capabilities across the enterprise, including a practical security maturity model. Mastering the technical aspects, processes, and people-dimensions of cloud environments, leaders will learn to make strategic security decisions that protect organizations and enable innovation. 12 hands-on Cyber42 leadership simulation exercises and a comprehensive capstone project build confidence and practical skills to lead business-oriented cloud security initiatives. Graduates will implement best practices tailored to their organization's specific needs, bridging technical security requirements with organizational transformation goals.

What You'll Learn

  • Create effective cloud security strategies for enterprises
  • Build security roadmaps supporting rapid cloud adoption
  • Leverage cloud security capabilities to enhance protection
  • Implement cloud security governance and compliance
  • Communicate cloud security vision to executives and teams

Business Takeaways

  • Accelerate business transformation with architect cloud security strategies
  • Evaluate your security posture against industry benchmarks to identify competitive advantages
  • Optimize security investments with metrics-driven ROI frameworks
  • Implement automated guardrails that protect assets while enabling innovation
  • Balance security controls with cloud adoption velocity to avoid becoming a bottleneck
  • Create unified governance frameworks that scale across multi-cloud environments

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR520: Cloud Security for Leaders.

Section 1Cloud Security Fundamentals and Identity Management

The first section develops foundational knowledge of cloud adoption models and understanding of Identity and Access Management (IAM), one of the most critical security domains in cloud security.

Topics covered

  • Cloud Service Models
  • Landing Zone establishment
  • Multi-account segregation strategies
  • Identity management best practices
  • Privileged access management

Labs

  • Cloud security planning
  • Landing Zone template scenario
  • IAM account and access scenario
  • MFA and SSO implementation
  • Access management workflow design

Section 2Cloud Security Environment Protection and Architecture

This section addresses how to manage cloud technology security, highlighting differences from on-premises environments and teaching critical capabilities and competencies.

Topics covered

  • Configuration management across services
  • CSPM services and tooling
  • Container and VM image security
  • Resource security automation
  • Cloud network design principles

Labs

  • Config Management implementation
  • Container/Image security management
  • Firewall/Network Architecture design
  • Security guardrail deployment
  • Resource protection automation

Section 3Data Protection, Security Detection and Response

This section explores three key cloud security domains: data asset protection, security detection and response, and governance aspects of cloud security.

Topics covered

  • Data encryption and key management
  • Automated data discovery and protection
  • Immutable backup strategies
  • Security monitoring
  • Security policy

Labs

  • Data Protection implementation
  • Security Monitoring configuration
  • Cost Management optimization
  • Encryption strategy development
  • Response automation planning

Section 4Securing Workload and Security Assurance

This section teaches students to secure applications in cloud environments, enabling security assurance mechanisms and workforce transformations to support cloud security initiatives.

Topics covered

  • DevSecOps best practices
  • SAST/DAST pipeline integration
  • Cloud protection services
  • Posture validation automation
  • Regulatory compliance management

Labs

  • Application Protection implementation
  • Security validation assessment
  • DevSecOps pipeline integration
  • Compliance framework mapping

Section 5Multicloud and Capstone Exercise

This section addresses multi-cloud strategy and Software-as-a-Service (SaaS) security management, culminating in a capstone exercise giving students the opportunity to apply all concepts and skills learned throughout the course.

Topics covered

  • Multi-cloud security governance
  • Technical configuration alignment
  • Workload mobility security
  • Data protection across providers
  • SaaS security management

Labs

  • Enterprise cloud migration capstone
  • Multi-cloud governance planning
  • SaaS security assessment
  • Security strategy presentation
  • Executive communication practice

Things You Need To Know

Relevant Job Roles

Cybersecurity Auditor

European Cybersecurity Skills Framework

Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.

Explore learning path

Cybersecurity Architect

European Cybersecurity Skills Framework

Plans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.

Explore learning path

Cyber Risk Officer

Cybersecurity Leadership

Lead, govern, and manage this risk for your organization.

Explore learning path

Cyber Threat Intelligence Specialist

European Cybersecurity Skills Framework

Collect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.

Explore learning path

Cloud Security Manager

Cloud Security

Developing cloud security roadmaps, plans and procurement models that define policy and procedure

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.

Explore learning path

Cloud Security Architect

Cloud Security

Designing the adoption of cloud services and define the tools and strategy for cloud solutions

Explore learning path

Cybersecurity Risk Manager

European Cybersecurity Skills Framework

Manage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.

Explore learning path

Media Exploitation Analyst

Digital Forensics and Incident Response

This expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.

Explore learning path

Cybersecurity Educator

European Cybersecurity Skills Framework

Improves cybersecurity knowledge, skills and competencies of humans.

Explore learning path

Program Management (OPM 801)

NICE: Oversight and Governance

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational  priorities.

Explore learning path

Penetration Tester

European Cybersecurity Skills Framework

Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

Explore learning path

Digital Forensics Investigator

European Cybersecurity Skills Framework

Ensure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.

Explore learning path

Cybersecurity Researcher

European Cybersecurity Skills Framework

Research the cybersecurity domain and incorporate results in cybersecurity solutions.

Explore learning path

Chief Information Security Officer (CISO)

European Cybersecurity Skills Framework

Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.

Explore learning path

Cybersecurity Implementer

European Cybersecurity Skills Framework

Develop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Jason Lam
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Jason Lam
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 7 of 7

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources