Course Outline

DAY 1

Introduction and Cloud Architecture

  • Define cloud computing
  • Cloud computing stack components
  • Cloud reference model and security

Infrastructure Security for Cloud Computing

  • Understand the components of cloud infrastructure
  • Assess security implications of deployment models
  • Advantages and disadvantages of virtual
  • Cloud management plane
  • Different service models security basics

Managing cloud computing security and risk

  • Risk and governance
  • Legal and compliance
  • Audit
  • Portability and interoperability
  • Incident response

Data security for cloud

  • Different cloud storage models
  • Security issues for data in cloud
  • Address cloud security and governance
  • Apply lifecycle to use cases
  • Discuss data encryption

Securing applications and users

  • Application architecture design and operations lifecycle
  • Discuss impact on SDLC
  • Examine application security tools
  • Discuss role of compliance in Cloud

Cloud Risk assessment

  • Adopt cloud computing
  • Migrate existing apps and systems

Create and secure a public cloud

  • Understand public IaaS architectures
  • Review EC2 components
  • Launch and connect to your first instance
  • Learn how to secure your instance

DAY 2

Encrypting an EBS volume

  • Why encrypt
  • Select a method
  • Create and attach Amazon EBS
  • Encrypt and format
  • Understand key management options
  • Understand effects of rebooting
  • Attach encrypted volume to another instance

Identity and access management

  • Learn how to secure your EC2 with AWS IAM
  • Understand federated identity architectures
  • Implement federated identity for application using OpenID
  • How to apply same principles in an enterprise production environment

Deploy and secure a Private Cloud

  • Understand private cloud architecture
  • Review OpenStack components
  • Create and connect a compute node
  • Manage OpenStack tenants and IAM
  • Secure OpenStack management plane
  • Investigate hypervisor security
  • Understand security automation

Selecting Cloud services

  • Enabling security strategy
  • Selecting a cloud provider
  • Security as a service
  • Summary and review
 14 Hours

Number of participants



Price per participant

Testimonials (6)

Related Courses

Advanced PHP and Secure Coding Course

35 Hours

Automotive Cyber Security Fundamentals

21 Hours

Business Continuity Practitioner

14 Hours

BeyondCorp: Implementing Zero Trust Security

14 Hours

CAS for Administrators

7 Hours

Crypto Currencies and the Blockchain

7 Hours

Cyber Crisis & Communications Planning

7 Hours

Cyber Crime in Business

7 Hours

Cyber Defence (SOC) Analyst Foundation

7 Hours

CISM - Certified Information Security Manager

28 Hours

Certified Information System Security Professional (CISSP) CBK Review

35 Hours

Cloudflare Essentials: CDN, Security, and DDoS Mitigation

14 Hours

Cloud Security Seminar

7 Hours

Capture the Flag (CTF)

14 Hours

Cyber Emergency Response Team (CERT)

7 Hours

Related Categories

1