Cloud Management and Security: Principles and Best Practice

Why Attend

Cloud computing is a new concept using old technologies. It has quickly become a vital tool in organizations across all industries as an Internet-scale computing infrastructure. Nevertheless, despite Cloud computing’s increasing relevance and popularity, there is a lack of understanding of the security risks associated with Clouds and optimal approaches for migration into Clouds. This course covers these from a practical angle; specifically, it covers Cloud computing architecture, management services, and security challenges. It also discusses Cloud migration planning and the main requirements to move current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical computing infrastructure.

  • Course Objectives

    By the end of the course, participants will be able to:

    • Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
    • Explain cloud structure, properties and management services
    • Set a cloud adoption strategy
    • Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
    • Analyze the major risks associated with the different cloud services and deployment models
    • Discuss the main principles, mechanisms and best practices for treating cloud risks
    • Demonstrate the discussed concepts using practical case studies, business models and industrial tools
  • Target Competencies

    • Cloud management
    • Identity management
    • Access management
    • Security risks management

What is the target audience?

  • Target Audience

    IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers

Cloud overview

1
Cloud definition, misconceptions and evolution
2
Cloud services and deployment types
3
Challenges

Cloud management

1
Cloud structure and its properties
2
Virtual and application layer management services
3
Cloud dynamic nature and its challenges
4
Application development and integration within clouds
5
Security best practices for automating cloud infrastructure management
6
Clarifying the concepts using industrial platforms

Establishing trust in clouds

1
Defining cloud trustworthiness
2
Its properties
3
Assessing cloud trustworthiness
4
Establishing trust in: Private , Hybrid , Community , Public cloud deployment types
5
Establishing trust in: IaaS (Infrastructure as a Service) , PaaS (Platform as a Service), SaaS (Software as a Service)
6
Clarifying the concepts using openstack management platform

Identity and access management

1
Authentication
2
Authorization
3
Access management
4
Federated access management
5
Insiders vs attackers
6
Insiders analysis and management
7
Related industrial tools : Cloud insider treatments , Cloud strong authentication

Provenance in clouds

1
Definition and Attribute
2
Challenges faced
3
Security risks mitigation using provenance
4
Case studies for using provenance: Forensic investigation, Trustworthy operational management , Proactive and predictive management , Bill assurance
5
Related industrial tools
Bangalore , India
22 - 26 March 2021

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 1 student
Lectures: 27

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed