Shop

About the Course

Organizations continue to adopt cloud services. This increases the complexity of security and protecting data. This course facilitates an understanding of the cloud computing environment with a specific focus on the cloud landscape, architecture and security principles. Introduces cloud computing concepts such as provider, customer, partner, storage, networking, scalability, and measured service. Introduces risk management analysis techniques and tools as well as identity and access management (IAM) solutions for the cloud. Describes the various legal and regulatory challenges specific to cloud environments.

Jun 03 - Dec 21, 2025

244ETF406
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
30 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jun 3 - Dec 21

Textbook

No Textbooks Listed.

Additional information

This is a continuous enrollment and self-paced course, so you can work through the modules at your own pace and when convenient for your schedule.

Jan 02 - Jun 12, 2026

253ETF406
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
24 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jan. 02 - Jun. 12

Textbook

No Textbooks Listed.

Additional information

This is a continuous enrollment and self-paced course, so you can work through the modules at your own pace and when convenient for your schedule.