WhatsApp : +918121020333 / +919849510373

India: +91 40 6050 1418

USA: +1 516 8586 242

UK: +44 (0)203 371 0077

cloud security training

Lorem ipsum

Introduction to Cloud Computing
  • Delivery models
  • Cloud types
  • Jericho Cloud Cube Model
Security Challenges
  • Introduction to the topic
  • Virtualization & multi-tenancy
  • Risk assessment for cloud migration
Infrastructure Security
  • Patch & configuration management
  • The Change management
  • Network & virtualization security
  • Application security for SaaS, PaaS, & IaaS
Policy & Governance for Cloud Computing
  • Internal policy needs
  • The Contract requirements for security
  • The Service-level agreements
  • Governance models for the cloud
Risk, Audit, & Assessment for the Cloud
  • The Risk management
  • The Auditing cloud
  • The Remote
  • The Onsite
  • The CloudAudit A6
  • Assessments for the cloud
  • The Penetration testing the cloud
  • The Internal assessments
Compliance & Legal Considerations
  • Compliance challenges for the cloud
  • Legal & geographic jurisdiction
  • Privacy concerns
  • Disaster Recovery & Business Continuity Planning in the Cloud
Data Security in the Cloud
  • Encryption types & availability
  • Key management & encryption architectures
  • The Data/information lifecycle
  • The Retention
  • The Disposal
  • The Classification
Identity & Access Management (IAM)
  • IAM architecture & relevance to the cloud
  • Authentication & authorization standards
  • Account management & provisioning
  • Federation
Intrusion Detection & Incident Response
  • The Incident detection for different cloud models
  • Managing Intrusion Detection System/Intrusion Prevention System (IDS/IPS) & alerting
  • The event management feedback loop