Get in Touch

Course Outline

Day 1

1. Cloud Computing Concepts and Architecture

a) Definitions of Cloud Computing

  • Service Models
  • Deployment Models
  • Reference and Architecture Models
  • Logical Models

b) Scope, Responsibilities, and Models of Cloud Security

c) Critical Focus Areas in Cloud Security

2. Governance and Enterprise Risk Management

a) Tools for Cloud Governance

b) Enterprise Risk Management in the Cloud

c) Impact of Various Service and Deployment Models

d) Cloud Risk Trade-offs and Mitigation Tools

3. Legal Issues, Contracts, and Electronic Discovery

a) Legal Frameworks Governing Data Protection and Privacy

  • Cross-Border Data Transfer
  • Regional Considerations

b) Contracts and Provider Selection

  • Contracts
  • Due Diligence
  • Third-Party Audits and Attestations

c) Electronic Discovery

  • Data Custody
  • Data Preservation
  • Data Collection
  • Response to Subpoenas or Search Warrants

4. Compliance and Audit Management

a) Compliance in the Cloud

  • Impact of compliance on cloud contracts
  • Scope of compliance
  • Requirements for compliance analysis

b) Audit Management in the Cloud

  • Right to audit
  • Audit scope
  • Auditor requirements

Day 2

5. Information Governance

a) Governance Domains

b) Six Phases of the Data Security Lifecycle and Their Key Elements

c) Data Security Functions, Actors, and Controls

6. Management Plane and Business Continuity

a) Business Continuity and Disaster Recovery in the Cloud

b) Architecting for Failure

c) Management Plane Security

7. Infrastructure Security

a) Cloud Network Virtualization

b) Security Implications of Cloud Networking

c) Challenges of Virtual Appliances

d) Security Benefits of Software-Defined Networking (SDN)

e) Micro-segmentation and the Software Defined Perimeter

f) Considerations for Hybrid Cloud Environments

g) Cloud Compute and Workload Security

8. Virtualization and Containers

a) Major Virtualization Categories

b) Network Virtualization

c) Storage Virtualization

d) Containerization

Day 3

9. Incident Response

a) Incident Response Lifecycle

b) Impact of the Cloud on Incident Response

10. Application Security

a) Opportunities and Challenges

b) Secure Software Development Lifecycle

c) Impact of the Cloud on Application Design and Architectures

d) The Rise and Role of DevOps

11. Data Security and Encryption

a) Data Security Controls

b) Types of Cloud Data Storage

c) Managing Data Migrations to the Cloud

d) Securing Data in the Cloud

12. Identity, Entitlement, and Access Management

a) IAM Standards for Cloud Computing

b) Managing Users and Identities

c) Authentication and Credentials

d) Entitlement and Access Management

13. Security as a Service (SecaaS)

a) Potential Benefits and Concerns of SecaaS

b) Major Categories of Security as a Service Offerings

14. Related Technologies

a) Big Data

b) Internet of Things (IoT)

c) Mobile Security

d) Serverless Computing

 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories