Cloud computing has many dimensions but security considerations overall can be grouped into three meta-categories, which are covered in this Cloud Computing Security Training course, including security policies, technologies and compliance, and governance. There are also a wide array of security concerns about systems that support cloud computing, such as client, transport, and server issues, that are not specifically addressed here but are covered in other ENO Institute courses as listed in the Related Courses section above.
- 4 Days of Cloud Computing Security Training from an Authorized Instructor
- Cloud Computing Security Electronic Study Guide)
- Certificate of Completion
- 100% Satisfaction Guarantee!
- 5G Wireless Security Training
- Cloud Security Fundamentals Training
- Certified Cloud Security Professional Training (CCSP)
- Certified Cloud Security Officer Training (CCSO)
- Cybersecurity Foundations Training
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cybersecurity Investigations and Network Forensics Analysis
Upon completing this Cloud Computing Security Training course, learners will be able to meet these objectives:
- Identify the dependencies of cloud-only security mechanisms on non-cloud security mechanisms
- Separate the various functional components of “Cloud Security” and how to assign responsibilities for each to the proper area within an organization
- Perform liaison and coordination of security with carriers, service providers, and cloud application providers
- Audit your Cloud Computing Security to assure compliance with the full range of governance and security requirements
- Identify and mitigate the Top Threats to cloud-based application delivery
- We can adapt this Cloud Computing Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Cloud Computing Security course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Cloud Computing Security course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Cloud Computing Security course in a manner understandable to lay audiences.
The target audience for this Cloud Computing Security Training course:
- Persons responsible for the security of cloud computing systems and information, working with cloud consumers, cloud providers, and/or third-party consulting and security organizations, will find the greatest value in this course.
The knowledge and skills that a learner must have before attending this Cloud Computing Security Training course are:
- Prior experience in network security and information assurance is a pre-requisite.
A high-level overview of the topic and the briefing.
Security and Privacy
- Data Protection
- Identity management
- Physical and Personnel
- Application Security
Lower Layer Security
Cloud Security Alliance (CSA)
Security Guidance for Critical Areas of Focus in Cloud Computing
- Domain 1: Cloud Computing Architectural Framework Governing in the Cloud
- Domain 2: Governance and Enterprise Risk Management
- Domain 3: Legal and Electronic Discovery
- Domain 4: Compliance and Audit
- Domain 5: Information Lifecycle Management
- Domain 6: Portability and Interoperability Operating in the Cloud
- Domain 7: Traditional Security, Business Continuity, and Disaster Recovery
- Domain 8: Data Center Operations
- Domain 9: Incident Response, Notification, and Remediation
- Domain 10: Application Security
- Domain 11: Encryption and Key Management
- Domain 12: Identity and Access Management
- Domain 13: Virtualization Cloud Controls Matrix
Cloud Computing Security Training – Compliance
- Data Governance
- Facility Security
- Human Resources Security
- Information Security
- Operations Management
- Risk Management
- Release Management
- Security Architecture
- Logs and Audit Trails
- Unique Industry Compliance Requirements
- CloudAudit and Automated Audit, Assertion, Assessment, and Assurance API (A6)
Top Threats to Cloud Computing
- Threat #1: Abuse and Nefarious Use of Cloud Computing
- Threat #2: Insecure Interfaces and APIs
- Threat #3: Malicious Insiders
- Threat #4: Shared Technology Issues
- Threat #5: Data Loss or Leakage
- Threat #6: Account or Service Hijacking
- Threat #7: Unknown Risk Profile
Legal and Contractual Issues
- Public Record
- FOIA / Open Records Laws
Security Review and Summary
A review of the briefing topics and summary of the program.