Get in Touch

Course Outline

DAY 1

Introduction to Cloud Architecture

  • Defining cloud computing
  • Components of the cloud computing stack
  • Cloud reference model and security frameworks

Infrastructure Security for Cloud Computing

  • Understanding cloud infrastructure components
  • Evaluating security implications of various deployment models
  • Pros and cons of virtualization
  • The cloud management plane
  • Basics of security across different service models

Managing Cloud Security and Risk

  • Risk management and governance
  • Legal requirements and compliance
  • Audit processes
  • Portability and interoperability
  • Incident response strategies

Data Security in the Cloud

  • Different cloud storage models
  • Security challenges for cloud data
  • Addressing cloud security and governance
  • Applying data lifecycle management to use cases
  • Discussion on data encryption

Securing Applications and Users

  • Application architecture design and operational lifecycle
  • Impact on the Software Development Life Cycle (SDLC)
  • Evaluation of application security tools
  • The role of compliance in cloud environments

Cloud Risk Assessment

  • Adopting cloud computing strategies
  • Migrating existing applications and systems

Creating and Securing a Public Cloud

  • Understanding public Infrastructure as a Service (IaaS) architectures
  • Reviewing EC2 components
  • Launching and connecting to your first instance
  • Methods for securing your instance

DAY 2

Encrypting an EBS Volume

  • Rationale for encryption
  • Selecting an encryption method
  • Creating and attaching an Amazon EBS volume
  • Encryption and formatting processes
  • Understanding key management options
  • Impact of system reboots
  • Attaching an encrypted volume to another instance

Identity and Access Management

  • Securing EC2 instances using AWS IAM
  • Understanding federated identity architectures
  • Implementing federated identity for applications via OpenID
  • Applying these principles in an enterprise production environment

Deploying and Securing a Private Cloud

  • Understanding private cloud architecture
  • Reviewing OpenStack components
  • Creating and connecting a compute node
  • Managing OpenStack tenants and IAM
  • Securing the OpenStack management plane
  • Investigating hypervisor security
  • Understanding security automation

Selecting Cloud Services

  • Enabling security strategies
  • Choosing a cloud provider
  • Security as a service
  • Summary and review
 14 Hours

Testimonials (7)

Upcoming Courses

Related Categories