Get in Touch

Course Outline

DAY 1

Introduction and Cloud Architecture

  • Definition of cloud computing
  • Components of the cloud computing stack
  • Cloud reference model and security

Infrastructure Security for Cloud Computing

  • Understanding cloud infrastructure components
  • Evaluating security implications of deployment models
  • Pros and cons of virtualization
  • Cloud management plane
  • Security fundamentals across different service models

Managing Cloud Computing Security and Risk

  • Risk and governance
  • Legal and compliance
  • Auditing
  • Portability and interoperability
  • Incident response

Data Security for the Cloud

  • Different cloud storage models
  • Security challenges for data in the cloud
  • Addressing cloud security and governance
  • Applying lifecycle concepts to use cases
  • Data encryption discussions

Securing Applications and Users

  • Application architecture design and operations lifecycle
  • Impact on the Software Development Life Cycle (SDLC)
  • Examination of application security tools
  • The role of compliance in the cloud

Cloud Risk Assessment

  • Adopting cloud computing
  • Migrating existing applications and systems

Creating and Securing a Public Cloud

  • Understanding public IaaS architectures
  • Reviewing EC2 components
  • Launching and connecting to your first instance
  • Securing your instance

DAY 2

Encrypting an EBS Volume

  • Reasons for encryption
  • Selecting an encryption method
  • Creating and attaching Amazon EBS volumes
  • Encryption and formatting processes
  • Understanding key management options
  • Effects of rebooting
  • Attaching encrypted volumes to another instance

Identity and Access Management

  • Securing EC2 instances with AWS IAM
  • Understanding federated identity architectures
  • Implementing federated identity for applications using OpenID
  • Applying these principles in an enterprise production environment

Deploying and Securing a Private Cloud

  • Understanding private cloud architecture
  • Reviewing OpenStack components
  • Creating and connecting a compute node
  • Managing OpenStack tenants and IAM
  • Securing the OpenStack management plane
  • Investigating hypervisor security
  • Understanding security automation

Selecting Cloud Services

  • Enabling security strategy
  • Selecting a cloud provider
  • Security as a service
  • Summary and review
 14 Hours

Testimonials (7)

Related Categories