Cloud Security Training

  • Participants will be able to Describe the physical and virtual components of and identify the principle technologies of cloud-based systems 
  • Participants will be able to Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments 
  • Participants will be able to Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing 
  • Understand and Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture 
  • Will be able to Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations 
  • Contrast between forensic analysis in corporate data center and cloud computing environments 
  • They will be able to Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing 
  • Participant will also be able to Identify and explain the six phases of the data lifecycle and as well Explain strategies for protecting data at rest and data in motion 
  • Participant will be able to Describe the role of encryption in protecting data and specific strategies for key management

5 Days

Basic experience on  Information security and Information Technology is needed