Description
Overview:
The Cloud is being widely adopted today for a diverse set of reasons! However, many are finding that security in the cloud is a huge challenge! Either because of implementation or Governance. Yes, Governance of security related to your cloud vendor is a huge challenge. However, many global standards have been developed that provide a great baseline for cloud security along with governance. This course will provide for you what you do not find in other classes! The combination of knowledge combined into one source from the leading global standards. We also provide practical skills regarding implementing cloud security, auditing and compliance. This is all managed by a unique delivery of cloud security along with the hands-on labs needed to truly understand what is happening to your data at all the layers of the cloud stack. This is a relevant course which introduces many technologies used in the cloud from implementing a private cloud architecture to using a new key management solution from various vendors.
Prerequisite(s):
Recommended minimum one-year experience with virtualization technology or equivalent knowledge. General understanding of cloud architectures. Minimum one-year experience with general security.
Audience:
Virtualization Administrators, Cloud Administrators, CIO, Virtualization and Cloud Auditors, Virtualization and Cloud Compliance Officers, anyone that needs a general understanding of security in the Cloud, those seeking the CCSP Certification.
Outline:
Module 1 – Introduction to Cloud Computing and Architecture
- Cloud Computing Terminology
- Cloud Computing Definition
- Cloud Computing Characteristics
- Cloud Computing Benefits
- Cost Benefit Analysis
- Reference Model
- What is Security for the Cloud?
Module 2 – Cloud Risks
- Cloud Migration Security Evaluation
- ENISA Risk Evaluation
- Cloud Controls Matrix
- Relevant CCM Controls
Module 3 – ERM and Governance
- Application of Governance and Risk Management to the Cloud
- Importance of the SLA
- Relevant CCM controls
Module 4 – Legal Issues
- Understanding Unique Risks in the Cloud
- International Law and Potential Conflicts
- eDiscovery
- Contract Considerations
- Relevant CCM Controls
Module 5 – Virtualization
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
Module 6 – Data Security
- Cloud Data Life Cycle
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Strategies
- Understand and Implement Data Discovery and Classification Technologies
- Design and Implement Relevant Jurisdictional Data Protection for PII
- Design and Implement Data Rights Management
- Plan and Implement Data Retention, Deletion and Archival Policies
- Design and Implement Auditability, Traceability, and Accountability of Data Events
- Relevant CCM Controls
Module 7 – Data Center Operations
- Build Logical Infrastructure for Cloud Environment
- Manage Logical Infrastructure for Cloud Environment
- Manage Communications with Relevant Parties
- Relevant CCM Controls
Module 8 – Interoperability and Portability
- Interoperability
- Portability
- Relevant CCM Controls
Module 9 – Traditional Security
- The Physical Environment
- Support the Planning Process for the Data Center Design
- Implement and Build Physical Infrastructure for Cloud Environment
- Run Physical Infrastructure for Cloud Environment
- Manage Physical Infrastructure for Cloud Environment
- Relevant CCM Controls
Module 10 – BCM and DR
- Disaster Recovery and Business Continuity Management
- Examples
- Relevant CCM Controls
Module 11 – Incident Response
- Incident Response
- Forensics
- Relevant CCM Controls
Module 12 – Application Security
- Training and Awareness
- Secure Software Development Life Cycle Process
- Application of the Secure Software Development Life Cycle
- Verifying the use of Secure Software
- Identity and Access Management (IAM) Solutions
- Additional components for the Cloud
- Software Assurance and Validation
- Relevant CCM Controls
Module 13 – Encryption and Key Management
- Review from other chapters
- Key Management in today’s cloud services
- Recommendations
- Relevant CCM Controls
Module 14 – Identity, Entitlement and Access Management
- Introduction to Identity and Access Management
- Identities and Attributes
- Architectures for Interfacing to Identity and Attribute Providers
- The Identity
- Recommendations
- Relevant CCM Controls
Module 15 – Auditing and Compliance
- Compliance and Audit Cloud Issues
- Assurance Frameworks
- Auditing
- CCM Relevant Controls
Labs – These are not all required during class but will be leveraged to better understand the complexities in cloud security.
- Lab 1: Cloud Migration Evaluation
- Lab 2: Service Level Agreement (SLA) Compliance
- Lab 3: Virtualization 101
- Lab 4: Understanding Network Traffic
- Lab 5: Hardening your Virtual Machines
- Lab 6: ESXi Host Hardening
- Lab 7: Hardening vCenter
- Lab 8: Basics of Data Security in Azure
- Lab 9: IaaS
- Lab 10: Deploying a Cloud
- Lab 11: Basic Data Center Operations in Azure
- Lab 12: Interoperability and Portability
- Lab 13: Business Continuity in Azure
- Lab 14: PaaS in Azure
- Lab 15: Encryption in Azure
- Lab 16: Identity and Access Management in Azure
- Lab 17: SaaS
- Lab 18: S-P-I Model Exercise
- Lab 19: Cloud Business Driver Audit Exercise
- Lab 20: IaaS Risk Assessment
- Lab 21: Identity and Access Control Management in the Private Cloud
- Lab 22: VM Security Audit
- Lab 23: Encryption/Key Management in SaaS
Reviews
There are no reviews yet.