Tenable Cloud Security Specialist Course
Buy instructor-led course for $2,200 Buy on-demand course for $2,200
Course description
The Tenable Cloud Security Specialist Course will give you the knowledge and skills you need to learn how to set up and administer the Tenable Cloud Security platform. It is designed for personnel responsible for identifying, assessing and remediating vulnerabilities and misconfigurations in their cloud environments (including AWS, GCP, OCI and Microsoft Azure). Content includes inventory management, operations, and detailed analysis to identify and reduce cyber risk in real-world scenarios.
This course is available in two delivery methods. There is a fast-paced, 2-day instructor-led virtual class, offered on a regular schedule. The self-paced, on-demand delivery option includes about 3 hours of video lectures and product demos, plus 2.5 hours of lab exercises, totaling at least 5.5 hours of content. Trainees get 16 hours of lab environment access with on-demand course purchase.
Audience
This course is suited for professionals with operational responsibilities who want to expand their knowledge to maximize the solution’s effectiveness. It is recommended for those seeking to obtain Specialist-level product certification.
Prerequisites
Tenable highly recommends that all participants complete the free Tenable Cloud Security Introduction Course, available at Tenable University, before attending this course.
CPE/CEU Credits
Tenable does not directly issue CEU or CPE credits for courses and certifications. CEU/CPE credits are awarded by the credentialing body associated with an individual’s professional certification (e.g., CompTIA, ISACA, ISC²). Tenable may provide a recommended CEU/CPE value which is noted on the certificate; however, final approval rests solely with the credentialing body and may be subject to their discretion and audit requirements.
Course outline
- Setting Up Your Environment
- Troubleshooting
- Product Overview
- Inventory Management
- Policies and Findings
- Identity and Access Management (IAM)
- Workload Protection
- Kubernetes
- Data Protection
- Infrastructure as Code (IaC)
- Compliance and Reporting
- Investigation, Forensics and Anomaly Detection
- Integrations and Automation
- Tenable Cloud Security