Cloud Security and Management: Best Principles and Applications

Methodology:
- Highly interactive course with group discussions, case studies, and exercises.
- Practical training to apply acquired knowledge in cloud computing security and management.
Course Objectives:
By the end of the course, participants will be able to:
- Understand the strengths, misconceptions, advantages, and weaknesses of cloud computing.
- Explain cloud architecture, assets, and administrative services.
- Develop a cloud adoption strategy.
- Discuss key requirements and infrastructure for a reliable cloud.
- Analyze major risks associated with different cloud services and deployment models.
- Discuss core principles and best practices for managing cloud risk solutions.
- Explain concepts using practical case studies, business models, and industry tools.
Target Audience:
- IT leaders, infrastructure leaders, decision-makers (CxO), risk analysts, strategic planners, architects, program and project managers.
Program Content:
- Cloud Overview:
- Definition, misconceptions, and evolution.
- Cloud services and deployment types.
- Challenges.
- Cloud Management:
- Cloud management structure and characteristics.
- Virtualized application services.
- Dynamic nature of the cloud and its challenges.
- Application development and integration within the cloud.
- Best practices for automating cloud infrastructure management.
- Explanation using industrial platforms.
- Trust in Clouds:
- Determining cloud reliability.
- Cloud characteristics.
- Assessing cloud reliability.
- Trust in:
- Private clouds.
- Hybrid clouds.
- Community clouds.
- Public Clouds deployment types:
- IaaS (Infrastructure as a Service).
- PaaS (Platform as a Service).
- SaaS (Software as a Service).
- Explanation using the OpenStack management platform.
- Identity and Access Management:
- Authentication.
- Authorization.
- Access management.
- Federated access management.
- Insiders vs. attackers.
- Insider analysis and management.
- Relevant industry tools:
- Identity management solutions.
- Strong authentication for clouds.
- Cloud Origins:
- Definition and characteristics.
- Addressing challenges.
- Mitigating security risks using sourcing.
- Case studies for sourcing usage:
- Criminal investigations.
- Trusted executive management.
- Proactive management and prediction.
- Bill assurance.
- Relevant industry tools.
Leave a reply