Cloud computing protection engineer against hacker attacks - course RUB 129,990. from Specialist, training, Date: November 28, 2023.
Miscellaneous / / November 29, 2023
A unique professional in terms of qualifications and experience, a leading teacher in the field of Computer Network Security.
He was the first in Russia to receive the status of an authorized instructor in ethical hacking. He is a member of the “Circle of Excellence” of ethical hacking instructors and has the status of Licensed Penetration Tester (Master). In his classes there is an atmosphere of a real celebration of knowledge, experience and skill. Listeners are delighted - read the reviews and see for yourself!
Holder of 50 prestigious international certifications, including 30 certifications in information security and ethical hacking. Master of Ethical Hacking and Penetration Testing (Licensed Penetration Tester Master). Offensive Security Certified Professional (OSCP) and Security Certified Program (SCP). Microsoft Certified Security Engineer (MCSE: Security) and certified instructor for EC-Council, Microsoft and CryptoPro.
Under the leadership of Sergei Klevogin, the team of the Specialist Center reached the finals of the World CyberOlympic Games 2015, where they won the Olympic award of Champions of the Region!
Regularly participates and conducts master classes at international conferences and forums on information security - Black Hat, Hacker Halted, OWASP AppSec, Positive Hack Days. Author and presenter of free seminars on hacking techniques and penetration testing.
Sergey Pavlovich has experience as a programmer in the Ministry of Defense of the Russian Federation, an information security inspector in the Central Bank of the Russian Federation, head of the Information Technology Department in a commercial bank, teacher at the Moscow Economic and Statistical Institute Institute. Sergei Pavlovich’s experience is very valuable in that it demonstrates both professional mastery of IT products and principles, and an understanding of the integration of business processes with information technology. And most importantly, Sergey Pavlovich shares his experience and can talk about complex technologies simply and clearly.
During his classes, Sergei Pavlovich combines an explanation of theoretical material with a demonstration of setting up various components of the system. The material is supplemented with details that often go beyond the scope of the course (a joke, an unexpected entertaining question, a funny computer trick).
You can find examples at the link: Hacking video.
Module 11. Standards, policies and legal aspects in the cloud (2 ac. h.)
Laws affecting cloud computing
Cloud Computing Standards
Cloud Audit Planning and Reporting
Standards, Policies, and Auditing in AWS
Standards, policies and auditing in Azure
Standards, Policies and Auditing in GCP
Module 12. Course review and final testing (2 ac. h.)
Training. Corporate governance. Information systems management. Right. Compliance. Working with data. Information Security. The program allows you to gain systemic knowledge and practical skills in the field of personal data legislation, taking into account the latest changes. On September 1, 2022, significant amendments to the Federal Law “On Personal Data” came into force. The second package of changes will take effect on March 1, 2023.
2,9
The purpose of the course is to give the student a basic understanding of security risks when working on the network and introduce the main protection tools and techniques, no matter what operating system, server or device defend themselves.
4
Secrets and features of the most popular area of information security, taking into account current innovations in legislation. This course provides a detailed analysis of technologies and methods of cryptographic information protection (electronic signature, encryption, blockchain hashing, etc.), as well as provides practical guidance on organizing work with enhanced electronic signatures, machine-readable powers of attorney, the procedure for protecting web resources using TLS and other questions. The program is aimed at specialists from commercial organizations and government agencies responsible for information protection and the use of electronic signatures, as well as specialists and experts in other areas of IT and IB. During the training process, students are provided with information taking into account the current goals and objectives of digital transformation. Based on the results of completing the course, students will be able to independently determine the need and procedure for using cryptographic tools information protection, effectively organize work on the use of enhanced electronic signatures: from organizing the receipt of qualified certificates in departmental certification centers (Federal Tax Service, Treasury) to ensure comprehensive verification of electronic signatures in information systems.
3,6