Course Outline
DAY 1
Introduction and Cloud Architecture
- Definition of cloud computing
- Components of the cloud computing stack
- Cloud reference model and security
Infrastructure Security for Cloud Computing
- Understanding cloud infrastructure components
- Evaluating security implications of deployment models
- Pros and cons of virtualization
- Cloud management plane
- Security fundamentals across different service models
Managing Cloud Computing Security and Risk
- Risk and governance
- Legal and compliance
- Auditing
- Portability and interoperability
- Incident response
Data Security for the Cloud
- Different cloud storage models
- Security challenges for data in the cloud
- Addressing cloud security and governance
- Applying lifecycle concepts to use cases
- Data encryption discussions
Securing Applications and Users
- Application architecture design and operations lifecycle
- Impact on the Software Development Life Cycle (SDLC)
- Examination of application security tools
- The role of compliance in the cloud
Cloud Risk Assessment
- Adopting cloud computing
- Migrating existing applications and systems
Creating and Securing a Public Cloud
- Understanding public IaaS architectures
- Reviewing EC2 components
- Launching and connecting to your first instance
- Securing your instance
DAY 2
Encrypting an EBS Volume
- Reasons for encryption
- Selecting an encryption method
- Creating and attaching Amazon EBS volumes
- Encryption and formatting processes
- Understanding key management options
- Effects of rebooting
- Attaching encrypted volumes to another instance
Identity and Access Management
- Securing EC2 instances with AWS IAM
- Understanding federated identity architectures
- Implementing federated identity for applications using OpenID
- Applying these principles in an enterprise production environment
Deploying and Securing a Private Cloud
- Understanding private cloud architecture
- Reviewing OpenStack components
- Creating and connecting a compute node
- Managing OpenStack tenants and IAM
- Securing the OpenStack management plane
- Investigating hypervisor security
- Understanding security automation
Selecting Cloud Services
- Enabling security strategy
- Selecting a cloud provider
- Security as a service
- Summary and review
Testimonials (7)
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
The presenter knowledge, way of speaking, sense of humour.
Rafal Kosz - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Open discussions
Krzysztof Pytko - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Trainer was calm, we had enough time to go through the subjects.
Andrzej Tarczynski - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
I enjoyed the trainer methods to attract our attention.
Antonio Osuna Sanchez - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
Ahmed was always trying to keep attention of us.
Alberto Brezmes - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.