Who should attend?

This Bootcamp and Live Industry Project caters to individuals seeking to address the current cybersecurity challenges within the evolving Australian cloud landscape. Tailored for those specialising in cloud security, the program equips participants with hands-on skills in securing AWS infrastructures, emphasizing key areas such as IAM, payment processing, and user data security, providing essential tools and knowledge to safeguard digital services and infrastructure in the cloud.

Schedule

Location
Level 4, 1/3 Fitzwilliam st, Paramatta, NSW 2150
Start-Date
18 February 2025
8 April 2025
3 June 2025
Duration
4 weeks
6 weeks
10 weeks
Timing
Weekday evenings and Saturdays

Program and Fee Options

Most sessions will be held face to face to ensure a high degree of engagement and support for learners.

4 Week
Bootcamp

Option 1
$ 740 pay in Full
  • You can also pay in 4-instalments
    (185$ per Week)

6 Weeks
Live Industry Project

Option 2
$ 790 pay in Full
  • You can also pay in 6-instalments
    (131.67$ per Week)

10 Weeks
Bootcamp
Live Industry Project

Option 3
$ 1430 pay in Full
  • You can also pay in 10-instalments
    (143$ per Week)
Popular

Bootcamp Outline

Orientation

  • Access to LMS (Learning Management System)
  • Video-based Instructions to Install Pre-requisite
  • Video explainers and background introduction to AWS, Github, Cloud Security, API Vulnerabilities, Australian Cyber Security Regulatory Requirements
  • Preview to all hands-on exercises, and working code-base in Github repos
  • Guidance on leveraging GitHub and ChatGPT for accelerated code generation

Week 1

AWS Foundations – Secure Data / Databases

  • Provision and Create AWS RDS (Database) – Setup the database environment on the cloud.
  • Hands-on Securing AWS RDS using Firewalls.
  • Understand Points of Vulnerabilities across AWS Tech Stack Layer 0: Infrastructure (OS, Network), Layer 1: Database, Layer 2: API, Layer 3: Application, Layer 4: User Identity.

Week 2

Managing Data Leaks via APIs (Realities on How Easy it is to Hack)

  • Hands-on Building Secure APIs using AWS Lambda and API Gateway – Building doors to the data.
  • Understand Data Leaks and Protecting API Endpoints using API Keys.
  • Learn how to steal / safeguard credentials in code using AWS Environment Variables and Secret Manager.

Week 3

Stealing / Protecting Keys and Verification (Reality of API Key Vulnerabilities)

  • Hands-on on stealing API keys and ill-designed applications.
  • Understand strategies to safeguard API keys in AWS.
  • Understand how to establish end-to-end mTLS using Digital certificates and AWS API Gateway.
  • Understand Server-side vs. Client-side Rendering Techniques in Application Design – For Securing API Keys.

Week 4

End-User Authentication and Securing Application Layer

  • Using AWS Cognito to enable user authentication layer, including MFA.
  • Hands-on using Self-Hosted Application with User Management with AWS Cognito.
  • Hands-on using AWS Cloudwatch for Monitoring and Logging.

FAQ's

While some foundational knowledge in cybersecurity will be helpful, this program is intended for students who are eager to gain practical understanding of cybersecurity concepts and hands-on experience.

This Bootcamp and Live Industry Project will address a range of technologies and concepts crucial for navigating the security challenges in Australia’s rapid transition to cloud platforms, particularly focusing on AWS and Microsoft Azure environments. Participants will delve into: 

  • Cloud Security Foundations and AWS IAM: Covering cloud security principles and a deep dive into AWS services like EC2, serverless architectures, S3 buckets, and detailed exploration of AWS Identity and Access Management (IAM), including keys, security groups, roles, and permissions. 
  • Advanced AWS Security and Data Protection: This includes advanced AWS security features, IAM configurations, key management, firewalling, network ACLs, and other AWS security measures, vital for protecting against sophisticated cyber threats and ensuring data integrity and confidentiality. 
  • Application Security, Authentication, and Payment Processing: The course will focus on securing applications with mechanisms like OAuth and Single Sign-On, managing AWS authentication protocols, payment processing solutions like Stripe, compliance with PCI DSS standards, best practices for storing and securing user passwords, and exploring social authentication methods. 
  • Advanced Security Practices and Real-world Application: Participants will learn advanced security techniques, such as securing API endpoints and implementing access controls, with case studies on recent data breaches focusing on API vulnerabilities. The final project involves building a secure cloud infrastructure integrating payment and user data security, providing hands-on experience in addressing complex security challenges. 

 

Overall, this Bootcamp and Live Industry Project equips participants with the necessary tools and knowledge to protect digital services and infrastructure in the evolving cloud environment of Australia.

On completion, participants will receive a statement of completion. Candidates completing a live industry project will also gain project experience they may want to add to their portfolio to showcase their skills to potential employers. 

Most sessions will be held face to face to ensure a high degree of engagement and support for learners, however all sessions are also online to cater to students across Australia. 

Men on laptop watching confident after completing the ECA Bootcamp