logo

Training and education

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s,

Exploring

Training and education

Training and EducationTraining and education are fundamental to building and maintaining a robust cloud security posture. The Cloud Security Alliance Swiss Chapter recognizes the importance of empowering professionals and organizations with up-to-date knowledge and practical skills in cloud security. Our approach to training is designed to address a broad range of needs, from foundational concepts to advanced, hands-on expertise.We support educational initiatives that cover key cloud security domains, including governance, risk management, compliance, secure cloud architecture, DevSecOps, and emerging topics such as artificial intelligence and Zero Trust. Training formats may include self-paced online courses, instructor-led workshops, certification programs, and scenario-based labs, making learning accessible and adaptable to different experience levels and professional backgrounds.
By fostering a culture of continuous learning, we aim to help individuals:Develop a solid understanding of cloud security principles and best practices.Stay current with evolving threats and industry standards.Enhance their career prospects through recognized certifications and practical experience.Reduce risks related to human error and misconfiguration in cloud environments.Contribute to a shared responsibility model for cloud security within their organizations.
The CSA Swiss Chapter is committed to supporting the community with relevant training opportunities and resources, aligned with global best practices and tailored to the unique needs of the Swiss cloud security landscape.

https://cloudsecurityalliance.org/education
https://cloudsecurityalliance.org/education/cloud-infrastructure-security-training
https://cloudsecurityalliance.org/education/advanced-cloud-security-practitioner-training
https://swisscyberinstitute.com
https://www.sans.org/cloud-security/
https://cloudsecurityalliance.org
https://cloudsecurityalliance.org/education/resources

https://cloudsecurityalliance.org/education/schedule

https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte6c788a4b4609171/5fcfa300a84f233eaf60f981/Cloud-Curriculum_Brochure_201125.pdf

https://sites.google.com/view/swiss-aviation-academy-switzer/

https://firebrand.training/en-ch/courses/csa

https://www.manageengine.com/log-management/cloud-security-in-education.html

https://akademie.safetycenter.ch/en

https://www.linkedin.com/learning/topics/cloud-security-alliance-14124888

https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/

https://blog.google/outreach-initiatives/google-org/cybersecurity-program/
https://www.learningtree.com/certifications/cloud-security-alliance/
https://www.coursera.org/courses?query=cloud+security
https://blog.checkpoint.com/company-and-culture/expanding-cyber-security-education-globally-secureacademy-partners-with-nonprofits/
https://www.swisscommunity.org/en/news-media/swiss-revue/article/educationsuisse-the-swiss-education-system

Blog

No content available

No Available Content

Please feel free to browse other topics on the site.

Publications

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

This publication provides guidance for small and medium-sized businesses (SMBs) transitioning to a Zero Trust architecture

DoD Zero Trust Strategy

This Zero Trust strategy, the first of its kind for the Department, provides the necessary guidance for advancing Zero Trust concept development; gap analysis, requirements development, implementation, execution decision-making, and ultimately procurement and deployment of required ZT capabilities and activities which will have meaningful and measurable cybersecurity impacts upon adversaries. Importantly, this document serves only as a strategy, not a solution architecture. Zero Trust Solution Architectures can and should be designed and guided by the details found within this document.

Department of Defense (DoD) Zero Trust Reference Architecture

The DoD Cybersecurity Reference Architecture (CS RA) documents the Department’s approach to cybersecurity and is being updated to become data centric and infuse ZT principles. ZT supports the 2018 DoD Cyber Strategy, the 2019 DoD Digital Modernization Strategy, the 2021 Executive Order on Improving the Nation’s Cybersecurity, and the DoD Chief Information Officer’s (CIO) vision for creating “a more secure, coordinated, seamless, transparent, and costeffective architecture that transforms data into actionable information and ensures dependable mission execution in the face of a persistent cyber threat.” 2 ZT should be used to re-prioritize and integrate existing DoD capabilities and resources, while maintaining availability and minimizing temporal delays in authentication mechanisms, to address the DoD CIO’s vision

NSTAC Report

In May 2021, in the aftermath of a series of significant cybersecurity incidents, the White House tasked the President’s National Security Telecommunications Advisory Committee (NSTAC) with conducting a multi-phase study on “Enhancing Internet Resilience in 2021 and Beyond.” The tasking directed NSTAC to focus on three key

Zero Trust Architecture

This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.

Zero Trust Maturity Model

Zero trust provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. The goal is to prevent unauthorized access to data and services and make access control enforcement as granular as possible. Zero trust presents a shift from a location-centric model to a more data-centric approach for fine-grained security controls between users, systems, data and assets that change over time; for these reasons. This provides the visibility needed to support the development, implementation, enforcement, and evolution of security policies. More fundamentally, zero trust may require a change in an organization’s philosophy and culture around cybersecurity.

NSA: Embracing a Zero Trust Security Model

As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary to deploy and operate a system engineered according to Zero Trust principles can better position them to secure sensitive data, systems, and services.