Advance Cloud Computing Security & cloud Forensics Techniques (Boot Camp)

Course Code: CS37

Advance Cloud Computing Security & cloud Forensics Techniques (Boot Camp)

 

Course Overview

This intensive hands-on course is designed to equip cybersecurity professionals with advanced knowledge and practical skills in securing cloud environments (AWS, Azure, GCP) and conducting digital forensics in complex cloud infrastructures. You will learn how to implement robust cloud security architectures, respond to cloud-based incidents, and perform forensic investigations in compliance with legal and regulatory standards.

 

Target Audience

This course is ideal for:

  • Cloud security professionals
  • Digital forensic investigators
  • Incident response teams
  • SOC analysts
  • IT professionals transitioning to cloud security
  • Cybersecurity consultants and auditors

Learning Objectives

By the end of this course, participants will be able to:

  1. Design and implement secure cloud architectures using native cloud security services.
  2. Identify and mitigate advanced cloud-based threats and misconfigurations.
  3. Perform live and post-incident forensic investigations in AWS, Azure, and hybrid environments.
  4. Collect, preserve, and analyze digital evidence from cloud services in a forensically sound manner.
  5. Automate security monitoring, alerting, and response using cloud-native tools and third-party platforms.
  6. Understand legal, compliance, and chain-of-custody requirements in cloud forensics.

Course Outcomes

After this course, you’ll be able to:

  • Secure cloud environments (AWS/Azure)
  • Identify and fix common cloud misconfigurations
  • Use cloud-native logging & monitoring tools
  • Perform forensic investigations on cloud or local systems
  • Prepare for certifications like:
    • AWS Certified Security – Specialty
    • Azure Security Engineer Associate
    • GCFA (GIAC Forensic Analyst)
    • Security+ (if still early in your journey)

Tools & Platforms Used

  • Cloud: AWS (free tier) or Azure (free credits)
  • Forensics: Autopsy, FTK Imager, Volatility, Wireshark
  • Security Scanners: ScoutSuite, Prowler
  • SIEM: OpenSearch/ELK or Azure Sentinel (optional)
  • Virtual Labs: TryHackMe, HackTheBox (for challenge VMs)

 

Structure:

  • Days 1–4: Core cybersecurity & networking foundation
  • Days 5–8: Cloud security topics
  • Days 9–11: Digital forensics tools & techniques
  • Day 12: Capstone practical scenario (cloud incident & forensic response)

 

 

Day

Topic

Key Learning Objectives / Activities

Day 1

Cybersecurity Fundamentals

- Threats, vulnerabilities, and attack vectors
- CIA triad, threat actors, kill chain
- Roles in cybersecurity
Activity: Analyze a real-world cyber attack case

Day 2

Networking & Cloud Infrastructure

- OSI & TCP/IP models
- Virtualization basics
- Cloud service models: IaaS, PaaS, SaaS
 Lab: Use Wireshark to capture basic network traffic

Day 3

Identity, Access, and Encryption

- IAM (Identity & Access Management) in cloud
- MFA, SSO, RBAC, ABAC
- Basics of encryption (SSL/TLS, KMS)
Lab: Set up IAM policies in AWS or Azure

Day 4

Cloud Platforms Overview

- AWS, Azure, GCP comparison
- Shared responsibility model
- Virtual networking (VPCs, security groups, firewalls)
 Lab: Create a secure VPC in AWS or Azure


| Day 5 | Cloud Security Architecture | - Cloud-native security controls (AWS GuardDuty, Azure Defender)

- Secure configuration management

- Monitoring & alerting

Lab: Deploy and secure a cloud-hosted web app |


| Day 6 | Cloud Threats & Misconfigurations | - Common cloud attacks (S3 leaks, privilege escalation, SSRF

- Real-world breaches (e.g. Capital One)

Lab: Scan cloud misconfigs using ScoutSuite or Prowler |


| Day 7 | Cloud Logging & Monitoring | - CloudTrail, CloudWatch (AWS), Azure Monitor

- Log aggregation and retention
- SIEM in the cloud (e.g. ELK, Sentinel)

Lab: Enable & analyze logs in cloud console |


| Day 8 | Incident Response in Cloud | - Incident detection, triage, and mitigation in cloud

 - Snapshotting & isolating compromised instances

- Reporting and post-mortem

Lab: Simulate a cloud breach and respond |


| Day 9 | Digital Forensics Overview | - Role of forensics in cybersecurity

- Chain of custody, legal considerations

- Forensic process (identify, acquire, analyze, report)

Exercise: Analyze a simple case scenario |


| Day 10 | Disk & Memory Forensics | - Imaging tools (FTK Imager, Autopsy, dd)

 - Volatile memory acquisition (Volatility framework)

- Metadata & file recovery

Lab: Recover deleted files from disk image |


| Day 11 | Cloud Forensics | - Differences from traditional forensics

- AWS/Azure log sources & data preservation

- Third-party tools (CloudTrail, forensic snapshots, FROST, etc.)

Lab: Investigate a cloud incident using logs |


| Day 12 | Capstone Simulation: Cloud Breach + Forensic Response | - You play both cloud defender & forensic analyst

 - Detect a breach, isolate resources, collect artifacts

- Analyze logs & memory to find attacker behavior

Deliverable: Forensic incident report presentation |

 

 


Register for this course


Date & Location

Date : 14 December 2025

Duration : 14 days

Place : Kuala Lumpur

Join This Course Now