Abstract

Note: This course was previously titled Detecting, Prioritizing, and Remediating Insecure Cloud Configurations with Datadog CSM.

Cloud Security Misconfigurations protects cloud environments by providing continuous configuration audits and real-time threat detection. Compliance Reports analyze your compliance posture against common industry frameworks.

In this course, you will configure and use Misconfigurations in live AWS and Google Cloud sandboxes. You will get hands-on experience detecting and remediating vulnerable resources in a multi-cloud environment.

Learning Objectives

Upon completing this course, you will be able to:

  • Enable Cloud Security Misconfigurations scanning for AWS
  • Detect vulnerable and misconfigured cloud resources in multiple cloud environments from a single view within Datadog
  • Use the Datadog Security Inbox and Misconfigurations Explorer to remediate misconfigured cloud resources
  • Evaluate compliance and cloud security posture using compliance reports and dashboards

Primary Audience

Cloud security practitioners, cloud engineers, and DevOps professionals who are interested in using Datadog Cloud Security to detect and remediate security risks across their cloud infrastructure.

Prerequisites

The prerequisites for this course are the following:

  • Completion of the Learning Environment course
  • Basic cloud computing knowledge (this course features AWS and Google Cloud environments)

Technical Requirements

In order to complete the course, you will need:

  • Google Chrome or Firefox

Course Navigation

At the bottom of each lesson, click the MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this course ends after 30 days. You can re-enroll at any time and pick up where you left off.

Course curriculum

    1. Introduction

    1. About Datadog Cloud Security

    2. Detecting Misconfigurations

    3. Compliance Reports and Dashboards

    1. Lab Overview

    2. Lab: Find and Remediate Cloud Vulnerabilities with Cloud Security Misconfigurations

    1. Summary

    2. Feedback Survey

Find and Remediate Vulnerable Cloud Resources with Cloud Security Misconfigurations

  • 1 hours to complete
  • Beginner