Cloudflare Essentials: CDN, Security, and DDoS Mitigation Training Course
Cloudflare is a widely used content delivery network and cloud security provider, serving millions of websites around the world.
This instructor-led, live training (available both online and onsite) is designed for beginner to intermediate-level system administrators and security professionals who want to learn how to implement Cloudflare for content delivery and cloud security, as well as how to mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Set up Cloudflare for their websites.
- Create DNS records and SSL certificates.
- Leverage Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to control traffic to their websites.
Format of the Course
- Interactive lectures and discussions.
- Ample exercises and hands-on practice.
- Practical implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- Overview of Cloudflare
- Benefits of using Cloudflare for content delivery and cloud security
- Signing up for a Cloudflare account
Getting Started
- Setting up DNS records and SSL certificates
- Configuring DNS for Cloudflare
- Understanding Cloudflare's SSL options
Content Delivery and Caching
- Caching static assets with Cloudflare
- Implementing Cloudflare for content delivery
- Accelerating dynamic content with Cloudflare Workers
Cloud Security
- Overview of Cloudflare's security features
- Configuring firewall rules to restrict traffic to websites
- Implementing Cloudflare for DDoS mitigation
Advanced Topics
- Using Cloudflare's Page Rules to implement advanced configurations
- Integrating Cloudflare with other services such as AWS and Google Cloud Platform
- Troubleshooting common issues with Cloudflare
Summary and Next Steps
- Review of course topics and key takeaways
- Best practices for using Cloudflare
- Resources for further learning and support
Requirements
- Basic knowledge of web development and networking concepts
- Familiarity with command-line interface
- Some experience in using web servers
Audience
- Developers
- System administrators
- Security professionals
Need help picking the right course?
Cloudflare Essentials: CDN, Security, and DDoS Mitigation Training Course - Enquiry
Cloudflare Essentials: CDN, Security, and DDoS Mitigation - Consultancy Enquiry
Related Courses
AI Security & Governance: Enterprise Implementation
7 HoursCourse Description
A comprehensive course focused on AI security, governance, compliance, and risk management for enterprise implementations. Designed for security professionals, compliance officers, and technology leaders responsible for secure AI deployment and governance frameworks.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
This course is designed for anyone involved in the fields of information security and information assurance.
What will I learn:
Upon completion, participants should be able to demonstrate:
- The ways in which managing information risk can bring significant business benefits.
- How to effectively use and explain information risk management terminology.
- Techniques for conducting threat and vulnerability assessments, business impact analyses, and risk assessments.
- An understanding of the principles of controls and risk treatment.
- The ability to present assessment results in a format that can serve as the foundation for a risk treatment plan.
- The application of information classification schemes.
Certified Chief Information Security Officer (CCISO)
35 HoursEC-Council’s CCISO Program has certified top-tier information security professionals globally. A select group of high-level information security executives, known as the CCISO Advisory Board, played a crucial role in shaping the program. They laid the groundwork for the program and defined the content that would be covered in the exam, body of knowledge, and training. Some members of the Board served as authors, others as exam writers, some as quality assurance reviewers, and still others as trainers. Each part of the program was designed with aspiring CISOs in mind, aiming to pass on the expertise of seasoned professionals to the next generation in the most critical areas for developing and maintaining a successful information security program.
The Certified CISO (CCISO) program is a pioneering training and certification initiative focused on producing top-tier information security executives. Unlike other certifications, the CCISO emphasizes not just technical knowledge but also the practical application of information security management principles from an executive perspective. Developed by current CISOs for both existing and aspiring CISOs, this program ensures that participants gain the necessary skills to lead effective information security initiatives.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training course teaches how risk assessment for information security is done by combining the information on ISO/IEC 27005:2022 and ISO/IEC 27001. In addition to theoretical knowledge, this training course is equipped with practical exercises, quizzes, case studies, all of which make it a very engaging training course.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course that emphasizes practical exercises to reinforce the concepts being taught and to build delegates' confidence in implementing business continuity management. The course also encourages debate and the sharing of knowledge and experience among participants. Delegates will benefit from the practical and extensive experiences of our trainers, who are active business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the importance of business continuity management (BCM) in all organizations
- Define the business continuity lifecycle
- Manage a business continuity program
- Understand their organization well enough to identify mission-critical impact areas
- Determine their organization's business continuity strategy
- Establish a business continuity response plan
- Conduct, maintain, and review plans
- Integrate business continuity into an organization
- Define terms and definitions relevant to business continuity
By the end of the course, delegates will have a comprehensive understanding of all key components of business continuity management and will be able to return to their work, making significant contributions to the business continuity management process.
Snyk
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course delves into the fundamental principles of security and IT Security, focusing on protecting networks from various attacks. Participants will acquire a solid understanding of key security protocols and the essential security concepts underlying web services. The course will also reference recent attacks on cryptosystems and highlight some of the associated vulnerabilities.