Get in Touch

Course Outline

DAY 1

Introduction and Cloud Architecture

  • Define cloud computing
  • Components of the cloud computing stack
  • Cloud reference model and security considerations

Infrastructure Security for Cloud Computing

  • Understand the components of cloud infrastructure
  • Evaluate security implications of various deployment models
  • Advantages and disadvantages of virtualization
  • Cloud management plane
  • Security basics across different service models

Managing Cloud Computing Security and Risk

  • Risk management and governance
  • Legal requirements and compliance
  • Audit processes
  • Portability and interoperability
  • Incident response

Data Security for the Cloud

  • Different cloud storage models
  • Security challenges associated with data in the cloud
  • Addressing cloud security and governance
  • Applying lifecycle management to use cases
  • Discussing data encryption

Securing Applications and Users

  • Application architecture design and operations lifecycle
  • Determine the impact on the Software Development Life Cycle (SDLC)
  • Evaluate application security tools
  • Discuss the role of compliance in the cloud

Cloud Risk Assessment

  • Adopting cloud computing
  • Migrating existing applications and systems

Create and Secure a Public Cloud

  • Understand public IaaS architectures
  • Review EC2 components
  • Launch and connect to your first instance
  • Learn how to secure your instance

DAY 2

Encrypting an EBS Volume

  • Reasons for encryption
  • Select a method
  • Create and attach Amazon EBS
  • Encrypt and format
  • Understand key management options
  • Understand effects of rebooting
  • Attach encrypted volume to another instance

Identity and Access Management

  • Learn how to secure your EC2 with AWS IAM
  • Understand federated identity architectures
  • Implement federated identity for application using OpenID
  • How to apply same principles in an enterprise production environment

Deploy and Secure a Private Cloud

  • Understand private cloud architecture
  • Review OpenStack components
  • Create and connect a compute node
  • Manage OpenStack tenants and IAM
  • Secure OpenStack management plane
  • Investigate hypervisor security
  • Understand security automation

Selecting Cloud Services

  • Enabling security strategy
  • Selecting a cloud provider
  • Security as a service
  • Summary and review
 14 Hours

Number of participants


Price per participant

Testimonials (7)

Upcoming Courses

Related Categories