Operational Cloud Security
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
The Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.
In this course you’ll learn to implement tools to use to monitor and manage through incidents.you’ll explore how to prepare for incident response in the cloud, configure monitoring and logging in the cloud. and learn how to select from SecaaS providers. finally you’ll have the skills and knowledge of Performing Cloud Security Operations needed to monitor and manage through incidents
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Learn what cloud computing is, its definitions, and roles
- Examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas).
- Take a look at the building blocks of what makes cloud computing tick, which is virtualization technology.
- Explore compute building block technologies;
- Storage building block technologies, and networking building block technologies
- Be aware of the different database building block technologies offered by your cloud provider.
- compare common public cloud solution provider (CSP) product offerings
- know thr Architectural Concepts & Design Requirements
- know the Cloud Data Security
- know the Cloud Platform & Infrastructure Security
- know the Cloud Application Security
- know the Operations
- know the Legal & Compliance
and describe:
- Key cloud characteristics
- Database technologies
- Public CSP product offerings
- Cloud computing technologies and concepts
- Virtualization technologies
- Compute technologies
- Storage technologies
- Networking technologies
- Cloud computing definitions and roles
-
COURSE AUDIENCE
This course is made for :
- Security Engineer
- Security Manager
- Systems Architect
- Security Administrator
- Systems Engineer
- Security Architect
- Security Consultant
- Enterprise Architect
-
COURSE OUTLINE
Day One
- Know what is the Cloud Computing
- Understand the security Challenges in the Cloud
Day Two
- Know more about the Infrastructure Security in the Cloud
- Understand how to achieve the data Security in the Cloud
- Understand how the policies and Governance act for Cloud Computing
Day Three
- Know more about the compliance and Legal Considerations
- Understand the Intrusion Detection and Incident Response
- know how to plan for disaster Recovery and Business Continuity in the Cloud
Day Four
- Architectural Concepts and Design Requirements
- Cloud Data Security
- Cloud Platform and Infrastructure Security
Day Five
- Cloud Application Security
- Operations
- Legal and Compliance