Table of Contents
- Cloud Security Fundamentals
- Understanding CSPM and the Threat Landscape
- CSPM Tools and Features
- CSPM Tool Selection
- Deploying the CSPM Tool
- Onboarding Cloud Accounts
- Onboarding Containers
- Exploring Environment Settings
- Exploring Cloud Asset Inventory
- Dashboard Overview
- Major Configuration Risks
- Investigating Threats with Query Explorers and KQL
- Vulnerability and Patch Management
- Compliance Management and Governance
- Security Alerts and Monitoring
- Integrating CSPM with IaC
- DevSecOps – Workflow Automation
- CSPM-Related Technologies
- Future Trends and Challenges

