Why Attend
As more organizations move data and infrastructure to the cloud, security is becoming a major priority. Operations and development teams are finding new uses for cloud services, and executives are eager to save money and gain new capabilities and operational efficiency by using these services. But will information security prove to be an Achilles’ heel? Many cloud providers do not provide detailed control information about their internal environments, and quite a few common security controls used internally may not translate directly to the public cloud.
Instructor-led training that uses interactive learning methods, including class discussion, small group activities, and role-playing
Who Should Attend Security architects; Senior security engineers; Technical security managers; Security Operations Center (SOC) analysts, engineers, and managers; CND analysts; Individuals working to implement Continuous Diagnostics and Mitigation (CDM), Continuous Security Monitoring (CSM), or Network Security Monitoring (NSM)
n/a
Day 1
Cloud Security Foundations
Introduction to the Cloud and Cloud Security Basics
Cloud Security Alliance Guidance
Cloud Policy and Planning
SaaS Security
Cloud Access Security
Day 2
Core Security Controls for Cloud Computing
Cloud Security: In-House versus Cloud
A Virtualization Security Primer
Cloud Network Security
Instance and Image Security
Identity and Access Management
Data Security for the Cloud
Application Security for the Cloud
Provider Security: Cloud Risk Assessment
Day 3
Cloud Security Architecture and Design
Cloud Security Architecture Overview
Cloud Architecture and Security Principles
Infrastructure and Core Component Security
Access Controls and Compartmentalization
Confidentiality and Data Protection
Availability
Day 4
Cloud Security Automation and Orchestration
Scripting and Automation in the Cloud
SecDevOps Principles
Creating Secure Cloud Workflows
Building Automated Event Management
Building Automated Defensive Strategies
Tools and Tactics
Real-World Use Cases
Day 5
Cloud Security – Offense and Defense
Threats to Cloud Computing
Vulnerability Management in the Cloud
Cloud Pen Testing
Intrusion Detection in the Cloud
Cloud IR and Event Management
Cloud Forensics