Online Cloud Security Vulnerability Management

Level: Intermediate

Become a Job-Ready Certified Cloud Risk Management Professional (CCRMP). To prevent the $2.1T in projected cyber breaches, employers need Certified Cloud Risk Management Professionals who have demonstrated they can implement the NIST Risk Management Framework and FedRAMP. The NIST Risk Management Framework (RMF) and the Federal Risk and authorisation Management Program (FedRAMP) are the de facto standards utilised for cloud security risk management in the U.S. today.

To address accelerating cyber staffing shortages, Mission Critical Institute (MCI) established the CCRMP to provide employers and candidates a performance-based cloud security certification.

As an MCI authorised training partner, Learning Tree can help you earn the CCRMP through five courses that ensure you acquire hands-on project experience in implementing the NIST RMF and FedRAMP.

This is the fifth of five courses that help you earn CCRMP certification.

Online Cloud Security Vulnerability Management

Key Features of this Online Cloud Security Vulnerability Management:

  • 100% hands-on and lab projects — no exams
  • Certified EC-Council practitioner instructor
  • Vulnerability management project experience employers seek
  • Recognition of curriculum by Department of Homeland Security

You Will Learn How To:

  • Differentiate between ethical and unethical testing
  • Distinguish between network and system cyberattacks and cyberattacks from vulnerabilities
  • Differentiate among various types of malware and cryptography
  • Apply various tools to conduct network penetration testing
  • Apply various tools and techniques to ethically hack a Wi-Fi network
  • Examine cloud and mobile device security
  • Apply tools and countermeasures to protect against, prevent, and mitigate cyberattacks and vulnerabilities

Choose the CCRMP Training Solution That Best Fits Your Individual Needs or Organisational Goals

ONLINE, INSTRUCTOR-LED

Online Instruction + Live Seminars

  • 8 weeks of "anywhere anytime" online instruction plus 4 live, online seminars
  • Earn academic credits for your accredited cloud security degree
  • Complete your 100% hands-on CCRMP certification
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Details & Schedule ›

Standard £2495

GET STARTED

PRODUCT #2099

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Contact Us for Team Pricing

GET STARTED

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

Online Instruction + Live Seminars

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Cloud Security Vulnerability Management Course Information

  • Cloud Security Vulnerability Management Course Description

    Cloud Security Vulnerability Management is designed to provide the skills and knowledge needed to proactively secure organisational information assets from cyberattacks. This course examines hacking tools and techniques used by security professionals and ethical hackers to protect computer networks and organisational assets in the cloud. Topics include: attack vectors, intrusion detection, honeypots, penetration testing, cryptography and steganography, user rights and privileges, security baseline analyzers, physical security, and operational security.

  • Course Deliverables

    • Conduct network penetration testing
    • Apply various tools and techniques to ethically hack a Wi-Fi network
    • Examine cloud and mobile device security
    • Apply tools and countermeasures to protect against, prevent, and mitigate cyberattacks and vulnerabilities
  • Prerequisites

  • Course Schedule

    The flexible, online 8-week course schedule enables you to collaborate with your instructor and fellow students to acquire the cloud security risk management expertise employers seek.

    Asynchronous Threaded Discussions
    Each week’s discussion threads focus on a specific cloud security risk management concept. You can participate in these discussions anytime, anywhere as you interact with your instructor and fellow students online.

    Four Live Virtual Seminars
    At 10 a.m. ET on alternate Saturdays you will participate in live-online interactive sessions led by your expert, practitioner instructor. Recordings of each session will be available to you.

    Virtual Office Hours
    To further enhance your learning experience, you may communicate with your instructor during weekly virtual office hours.

  • Course Materials

    The following materials are required for the course and must be supplied by the attendee:

    • EC-Council iLabs eKit (includes electronic book and access code). Order through the Mission Critical Institute.
    • Simpson, Michael T. & Antill, Nicholas. Hands-On Ethical Hacking and Network Defence, Third Edition. Cengage Learning, 2017 ISBN-13 9781285454610.
    • USB Drive — Minimum 16 GB.
    • The course also contains links to a Course Webliography for required readings.
  • Coursework

    Students will work with their EC-Council certified practitioner instructor to produce EC-Council iLabs assignments, participate in weekly virtual discussions, as well as complete weekly assignments and project reports. They will attend bi-weekly, live virtual seminars led by their instructor.

  • Software/Hardware Required

    • Access to Microsoft Office, including Word, Excel, and a PDF reader.
    • Access to high-speed internet connection.
    • A headset with microphone is recommended; using built-in speakers/microphone causes echo issues. Headsets give participants complete interaction with the instructor and other students.

Cloud Security Vulnerability Management Course Outline

  • Introduction to Hacking Lifecycle

    • Introduction to Ethical Hacking
    • Footprinting and Reconnaissance
  • Network Scanning and Vulnerability Assessment

    • Scanning Networks
    • Enumeration
    • System Hacking
  • Viruses, Worms, Trojans and Social Engineering

    • Malware Threats
    • Sniffing
    • Social Engineering
    • Denial-of-Service
  • Sniffing, Packet Analysis, and Wireshark

    • Session Hijacking
    • Hacking Webservers
    • OWASP’s Top 10 Vulnerabilities
    • Attacking Authentication
  • Web Application Concepts and SQL Injection

    • Hacking Web Applications
    • SQL Injection
    • Web Application (In)Security
    • Bypassing Client-Side Controls
  • Hacking

    • Hacking Wireless Networks
    • Hacking Mobile Platforms
    • Evading IDS, Firewalls, and Honeypots
    • Wireless Hacking
  • Cloud Computing Security

    • Securing Cloud Computing services
    • Symmetric and Asymmetric Cryptography
    • Hashing Techniques
    • PKI and PGP

Team Training

Cloud Security Vulnerability Management FAQs

  • Who should become a CCRMP?

    Individuals seeking to advance in cybersecurity risk management to positions in which the NIST RMF/FedRAMP is utilised to secure integrated cloud and on-premise systems in the following sectors:

    • Systems Integrators
    • Federal Civilian, DoD, and Intelligence Communities
    • Critical Infrastructure Protection
    • Financial Services
    • HIPAA
    • And More
  • What are the eligibility requirements for CCRMP certification?

    Eligibility for the CCRMP Certification
    To receive the CCRMP certification, applicants must:

    • Demonstrate competency with the CCRMP Common Body of Practise by producing specified NIST RMF/FedRAMP deliverables.
    • Have five years of relevant technical experience or substitute a bachelor's degree for two years of relevant experience.

    Demonstration of CCRMP CBP Competencies
    To demonstrate mastery of the CCRMP CBP, applicants produce the deliverables by:

    • Satisfactorily completing an MCI-approved cybersecurity/cloud security risk management curriculum, offered through an MCI academic partner.
      Or
    • Submitting a portfolio of project deliverables that demonstrates the mastery of CBP competencies.

      For details, please review the CCRMP Policies and Procedures ›
  • Which courses can help me earn CCRMP certification?

    Mission Critical Institute offers a five-course learning pathway to help you earn your CCRMP certification. The courses must be take in this order:

  • What is the Mission Critical Institute?

    The Mission Critical Institute advances cybersecurity careers and thought leadership by developing career-focused cybersecurity education and training programs for use by universities and cybersecurity employers. In addition, MCI provides strategic cybersecurity consulting services to employers and higher education institutions.

  • What is the NIST RMP and FedRAMP?

    The NIST Risk Management Framework (RMF) and the Federal Risk and Authorisation Management Program (FedRAMP) are the de facto standards utilised for cloud security risk management in the U.S. today. To address accelerating cyber staffing shortages, Mission Critical Institute (MCI) established the CCRMP to provide employers and candidates a performance-based cloud security certification.

call 0800 282 353
chat Live Chat




Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français