Eric Johnson
Senior InstructorPrincipal Security Engineer at Puma Security
Specialities
Cloud Security
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCloud Security
Eric is a Co-founder and Principal Security Engineer at Puma Security and a Senior Instructor with the SANS Institute. His experience includes cloud security assessments, cloud infrastructure automation, static source code analysis, web and mobile application penetration testing, secure development lifecycle consulting, and secure code review assessments. Eric is the lead author and an instructor for SEC540: Cloud Security and DevSecOps Automation and a co-author and instructor for both SEC549: Cloud Security Architecture, and SEC510: Cloud Security Controls and Mitigations. Additionally, Eric is a SANS Security Awareness Developer Training Advisory Board Member and SANS Analyst for Application Security and DevSecOps Surveys.
Great course! Excellent instructor! Lot of hands-on! Definitely met my expectations and I will absolutely recommend this training to other people.
Best instructor I've ever had, in anything.
Eric was fantastic. Engaging, relatable, and available. I would take another course simply because he is teaching it.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
Organizations are moving data and applications into public cloud services at a rapid pace. As the public cloud footprint expands, red teams and attackers are reinventing the kill chain in the cloud. Public cloud services provide new, creative ways to discover assets, compromise credentials, move laterally, and exfiltrate data. In this webcast, Eric Johnson (SEC510 and SEC540 author) explores common cloud attack techniques from the MITRE ATT&CK Cloud Matrix. For each technique, we will analyze misconfigurations, exploitation paths, and common architecture patterns for breaking the kill chain.
Organizations are becoming multicloud by choice or by chance. Many of them integrate their multiple clouds with one another to improve Availability, support Disaster Recovery, and leverage the services from each provider that best fits their needs.
Attackers have been breaching the cloud for years by stealing long-lived credentials. To combat these attacks, cloud providers have been building improved authentication workflows for external identity providers. This workshop explores Workload Identity Federation and how you can replace long-lived cloud credentials with short-lived tokens signed by an OpenID Connect identity provider.
Before you can help DevOps teams solve security problems and improve their security programs, you need to understand how they think, how they work, and the tools that they use.
In the final part of the Cloud Security Flight Simulator series, join SEC540 lead author and instructor Eric Johnson to learn how to enable workload identity for AWS Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS).
In this webcast, join the authors of SEC549: Cloud Security Architecture to explore the push and pull logging architecture used by Microsoft Sentinel to ingest cross-cloud audit logs. Attendees will see the log journey from both AWS CloudTrail and Google Cloud Audit Logs into Microsoft Sentinel and learn some fun Kusto Query Language (KQL) queries to investigate cloud events.
Captain KubeAce Maverick and the Aviata team are still reeling from the Kubernetes attack that resulted in the theft of their valuable flight plan and pilot data.
Microsoft is committed to building products to help government agencies and critical infrastructure companies improve national cybersecurity. This webinar will cover how Microsoft Entra ID helps organizations meet the identity requirements of the Executive Order.
As the digital landscape continues to evolve, so do the threats that put organizations at risk. With 2025 on the horizon, the urgency to anticipate and prepare for emerging cybersecurity challenges has never been greater. This webcast is designed specifically for cybersecurity practitioners who are looking to future-proof their skills and defenses to combat these challenges.
Part 2: Secure by Design: Elevating Security Beyond DefaultsIn Part 2 of this series, we focus on how Secure by Design (SbD) shifts development approaches to integrate security from the ground up, reducing risks early and creating systems that are resilient and secure by default.
The 2024 Accelerate State of DevOps report shows that software delivery is faster than ever, with 41% of teams deploying systems more than once a week. As speed increases, the average change control lead time has dropped to less than a week.
The Cloud Native Computing Foundation (CNCF) 2024: The Top Data Trends Driving the Future of the Enterprise report estimates that 80% of new and refactored applications are being built to run on cloud native platforms, with Kubernetes powering the infrastructure.
Review relevant educational resources made with contribution from this instructor.