Get in Touch

Course Outline

Day 1

1. Cloud Computing Concepts and Architecture

a) Definitions of Cloud Computing

  • Service Models
  • Deployment Models
  • Reference and Architecture Models
  • Logical Model

b) Scope, Responsibilities, and Models of Cloud Security

c) Critical Areas of Focus in Cloud Security

2. Governance and Enterprise Risk Management

a) Tools for Cloud Governance

b) Enterprise Risk Management in the Cloud

c) Impacts of Various Service and Deployment Models

d) Cloud Risk Trade-offs and Tools

3. Legal Issues, Contracts, and Electronic Discovery

a) Legal Frameworks for Data Protection and Privacy

  • Cross-Border Data Transfer
  • Regional Considerations

b) Contracts and Provider Selection

  • Contracts
  • Due Diligence
  • Third-Party Audits and Attestations

c) Electronic Discovery

  • Data Custody
  • Data Preservation
  • Data Collection
  • Response to Subpoenas or Search Warrants

4. Compliance and Audit Management

a) Compliance in the Cloud

  • Impact of Compliance on Cloud Contracts
  • Scope of Compliance
  • Requirements for Compliance Analysis

b) Audit Management in the Cloud

  • Right to Audit
  • Audit Scope
  • Auditor Requirements

Day 2

5. Information Governance

a) Governance Domains

b) Six Phases of the Data Security Lifecycle and Their Key Elements

c) Data Security Functions, Actors, and Controls

6. Management Plane and Business Continuity

a) Business Continuity and Disaster Recovery in the Cloud

b) Architecting for Failure

c) Management Plane Security

7. Infrastructure Security

a) Cloud Network Virtualization

b) Security Changes Associated with Cloud Networking

c) Challenges of Virtual Appliances

d) Security Benefits of SDN

e) Micro-segmentation and the Software Defined Perimeter

f) Hybrid Cloud Considerations

g) Cloud Compute and Workload Security

8. Virtualization and Containers

a) Major Virtualization Categories

b) Network

c) Storage

d) Containers

Day 3

9. Incident Response

a) Incident Response Lifecycle

b) How the Cloud Impacts Incident Response

10. Application Security

a) Opportunities and Challenges

b) Secure Software Development Lifecycle

c) How the Cloud Impacts Application Design and Architectures

d) The Rise and Role of DevOps

11. Data Security and Encryption

a) Data Security Controls

b) Types of Cloud Data Storage

c) Managing Data Migrations to the Cloud

d) Securing Data in the Cloud

12. Identity, Entitlement, and Access Management

a) IAM Standards for Cloud Computing

b) Managing Users and Identities

c) Authentication and Credentials

d) Entitlement and Access Management

13. Security as a Service

a) Potential Benefits and Concerns of SecaaS

b) Major Categories of Security as a Service Offerings

14. Related Technologies

a) Big Data

b) Internet of Things

c) Mobile

d) Serverless Computing

 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories