Cloudflare – CDN, Security and DDoS Protection

Available Hours: 16 Last updated 05/2026

Description

This training is intended for those with basic knowledge of DNS and computer networks who want to better understand how internet services work and improve their security. The material has been prepared in an accessible manner, combining theory with practical examples.

Participants will learn how DNS works, its key records, and how to configure domains and email. A special emphasis is placed on security—including protection against phishing, spam, and domain spoofing.

An important part of the training is working with the Cloudflare platform. Participants will learn its key features, such as DNS management, attack protection, and service performance improvement.

Finally, the Zero Trust concept is discussed, demonstrating how to effectively control access to resources and increase security within an organization.

Who is this for?

System and network administrators who want to deepen their knowledge of DNS management and security. DevOps specialists and cloud engineers working with internet infrastructure. Individuals responsible for IT security within an organization (SecOps, SOC). Small and medium-sized business owners who independently manage their domain and email infrastructure. Anyone who wants to better understand the mechanisms for protecting internet services and implementing a Zero Trust model.

Training goals

  • Deepening your knowledge of DNS operation and configuration,
  • Learning how to secure domains and email (including SPF, DKIM, DMARC),
  • Learning about the performance and security capabilities of the Cloudflare platform,
  • Understanding the risks associated with internet traffic and how to minimize them,
  • Introduction to the concept of Zero Trust architecture and its practical application,
  • Acquiring skills in configuring Cloudflare services in a production environment.

Training format

online and in-person

Benefits for the organization

  • Increasing the security of domains and online services,
  • reducing the risk of abuses such as phishing, spoofing, and DDoS attacks,
  • improving the availability and performance of websites,
  • better network traffic management and access control,
  • implementing modern security standards based on the Zero Trust model,
  • improving the competencies of the IT team, which translates into greater independence from external vendors.