Course Outline
DAY 1
Introduction to Cloud Architecture
- Defining cloud computing
- Components of the cloud computing stack
- Cloud reference model and security frameworks
Infrastructure Security for Cloud Computing
- Understanding cloud infrastructure components
- Evaluating security implications of various deployment models
- Pros and cons of virtualization
- The cloud management plane
- Basics of security across different service models
Managing Cloud Security and Risk
- Risk management and governance
- Legal requirements and compliance
- Audit processes
- Portability and interoperability
- Incident response strategies
Data Security in the Cloud
- Different cloud storage models
- Security challenges for cloud data
- Addressing cloud security and governance
- Applying data lifecycle management to use cases
- Discussion on data encryption
Securing Applications and Users
- Application architecture design and operational lifecycle
- Impact on the Software Development Life Cycle (SDLC)
- Evaluation of application security tools
- The role of compliance in cloud environments
Cloud Risk Assessment
- Adopting cloud computing strategies
- Migrating existing applications and systems
Creating and Securing a Public Cloud
- Understanding public Infrastructure as a Service (IaaS) architectures
- Reviewing EC2 components
- Launching and connecting to your first instance
- Methods for securing your instance
DAY 2
Encrypting an EBS Volume
- Rationale for encryption
- Selecting an encryption method
- Creating and attaching an Amazon EBS volume
- Encryption and formatting processes
- Understanding key management options
- Impact of system reboots
- Attaching an encrypted volume to another instance
Identity and Access Management
- Securing EC2 instances using AWS IAM
- Understanding federated identity architectures
- Implementing federated identity for applications via OpenID
- Applying these principles in an enterprise production environment
Deploying and Securing a Private Cloud
- Understanding private cloud architecture
- Reviewing OpenStack components
- Creating and connecting a compute node
- Managing OpenStack tenants and IAM
- Securing the OpenStack management plane
- Investigating hypervisor security
- Understanding security automation
Selecting Cloud Services
- Enabling security strategies
- Choosing a cloud provider
- Security as a service
- Summary and review
Testimonials (7)
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
The presenter knowledge, way of speaking, sense of humour.
Rafal Kosz - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Open discussions
Krzysztof Pytko - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Trainer was calm, we had enough time to go through the subjects.
Andrzej Tarczynski - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
I enjoyed the trainer methods to attract our attention.
Antonio Osuna Sanchez - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
Ahmed was always trying to keep attention of us.
Alberto Brezmes - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.