Skip to content

Commit 43b61fe

Browse files
committed
grammar fixes in phase5
1 parent 11e3726 commit 43b61fe

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

docs/phase5/README.md

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,17 @@ Author: [Dayspring Johnson](https://twitter.com/daycyberwox)
44

55
## How does this phase apply to Cloud?
66

7-
Security is the biggest challenge to cloud computing. As cloud adoption continues to grow, cloud security incidents and vulnerabilities are equally on the rise.
7+
Security is the biggest challenge in cloud computing. As cloud adoption continues to grow, cloud security incidents and vulnerabilities are equally on the rise.
88

9-
The individual cloud components you were introduced to in the previous phases all require security in some shape or form. Better yet, security has to be considered from every perspective in order to prevent malicious actors from finding and exploiting vulnerabilities in our cloud environments which could potentially lead to data or infrastructure compromise.
9+
The individual cloud components you were introduced to in the previous phases all require security in some shape or form. Moreover, security must be considered from every perspective to prevent malicious actors from finding and exploiting vulnerabilities in our cloud environments, which could potentially lead to data or infrastructure compromise.
1010

11-
Here's one of my favorite articles by [Christophe Tafani-Dereeper](https://twitter.com/christophetd) that covers Cloud Security Breaches and Vulnerabilities:
11+
Here's one of my favorite articles by Christophe Tafani-Dereeper that covers Cloud Security Breaches and Vulnerabilities: [Cloud Security Breaches and Vulnerabilities: 2021 in Review](https://example.com).
1212

13-
- [Cloud Security Breaches and Vulnerabilities: 2021 in Review](https://blog.christophetd.fr/cloud-security-breaches-and-vulnerabilities-2021-in-review/)
13+
I also recommend checking out "Securing DevOps: Security in the Cloud" by Julien Vehent, which covers several core components for protecting cloud infrastructure, logging, detecting threats, and more. It even includes practical and visual aids that help in learning these concepts.
1414

15-
I also recommend checking out [Securing DevOps: Security in the Cloud](https://www.manning.com/books/securing-devops) by [Julien Vehent](https://twitter.com/jvehent) which covers several of the core components for protecting cloud infrastructure, logging, detecting threats and so on. It even has practical and visual aids that help in learning these concepts.
15+
Another book recommendation is "Practical Cloud Security: A Guide for Secure Design and Deployment" by Chris Dotson. This book is a good complementary resource to the previous one, as it goes in-depth into various concepts, standards, frameworks, and principles required for cloud security, and as the name implies, it is practical.
1616

17-
Another book recommendation is [Practical Cloud Security: A Guide for Secure Design and Deployment](https://www.oreilly.com/library/view/practical-cloud-security/9781492037507/) by [Chris Dotson](https://www.linkedin.com/in/chris-dotson-6a9b55/). This book is a good complimentary resource to the previous book as it goes in-depth into various concepts, standards, frameworks and principles required for cloud security, and as the name implies, it is practical.
18-
19-
Always remember this, you can not secure what you do not understand, so make sure to understand the architectural and core components of the cloud so that you can properly secure them.
17+
Always remember, you cannot secure what you do not understand, so make sure to understand the architectural and core components of the cloud so that you can properly secure them.
2018

2119
## Resources
2220

@@ -52,14 +50,14 @@ Azure | [SIEM Tutorial for Beginners Azure Sentinel Tutorial MAP with LIVE CYBER
5250

5351
## Things you should be familiar with at the end of this phase
5452

55-
- An understanding of core IAM concepts (Users, Roles, Policies, Groups, Service Accounts/Principals, etc.)
56-
- An understanding of how authentication works in the cloud.
57-
- An understanding of secure cloud storage, compute, networking, applications and so on .
58-
- Common security vulnerabilities and misconfigurations in the cloud.
59-
- How to investigate cloud logs and determine if a cloud environment has been compromised.
60-
- How to simulate attacks against cloud environments.
61-
- How to deploy vulnerable infrastructure in the cloud for security testing.
62-
- Knowledge and usage various cloud security tools.
53+
- Understanding of core IAM concepts (Users, Roles, Policies, Groups, Service Accounts/Principals, etc.).
54+
- Understanding of how authentication works in the cloud.
55+
- Secure cloud storage, compute, networking, applications, etc.
56+
- Common security vulnerabilities and misconfigurations in the cloud.
57+
- How to investigate cloud logs and determine if a cloud environment has been compromised.
58+
- How to simulate attacks against cloud environments.
59+
- How to deploy vulnerable infrastructure in the cloud for security testing.
60+
- Knowledge and usage of various cloud security tools.
6361

6462
## Certifications you might want to look into
6563

0 commit comments

Comments
 (0)