Cloud Security Training Days 3 and 4 Syllabus

Size: px
Start display at page:

Download "Cloud Security Training Days 3 and 4 Syllabus"

Transcription

1 November 2012 Intrinsec Security Technologies Cloud Security Training Days 3 and 4 Syllabus A Hands-On Companion Course to Cloud Security Alliance Training.

2 Page 2 To Order Call: Day 3 Contents Course Focus The focus of the third day is a natural continuation of the content found in CSA Plus course. The discussions and hands-on activities throughout the day serve to enhance true understanding of cloud technologies delivered in the first two days of training. In this session, we analyze some key topics that will be required when your organization is implementing cloud computing technology. Topics covered include: Virtualization Security This session consists of an expanded discussion of Private Cloud Security Controls discussed in day two, including: VMWare vcloud Architecture This section analyzes the VMWare vcloud infrastructure. We cover the components required within a VMWare-based private cloud system. Hypervisor Security (including types of hypervisors) We investigate industry best practices for hypervisor security and look at the types of hypervisors in the marketplace. Introspection capabilities and benefits Guest Introspection can change the way you secure virtualized workloads. Updating of offline images Coverage of the latest technologies to ensure that images used in our private environment are not vulnerable before they are deployed in production. Zoning versus Air-gapping Virtual Systems This discussion covers high-level architectural design goals.

3 Intrinsec Security Technologies Page 3 Day 3 Contents (Continued) Virtual Private Clouds From architecture to secure implementation, this session consists of both discussion and hands-on experience with Virtual Private Cloud technology. In the associated labs, students will: Introduction to Virtual Private Cloud This section introduces VPC technology. Upon completion, students understand the differences and limitations of Virtual Private Clouds. Create a Virtual Private Cloud in Amazon Web Services (AWS) Students build up their own VPC and explore key differences between VPC and regular Cloud Computing. Networking in Virtual Private Clouds Students will explore the network options available only within Virtual Private Cloud technology. Some key activities include: Create both public and private subnets in their own Virtual Private Cloud Analyze and modify additional security settings in VPC such as egress filtering and Access Control Lists Automating with Command-Line Tools Work with Amazon Command line tools to rapidly create and terminate server instances. Working with Microsoft Windows Instances This section has students create Windows-Based IaaS systems in AWS.

4 Page 4 To Order Call: Day 4 Contents Course Focus The focus of the fourth day is to extend student knowledge of the tools and technologies that can be leveraged by companies to manage and secure Cloud-based systems from an enterprise perspective. In this session, we look at some technologies that can be used to address the Cloud Security Alliance Top 7 Threats to Cloud Computing. After analyzing select technologies, students then implement key Security as a Service (SecaaS) to drive home how others are securing cloud infrastructures. Technical Controls Shootout ***Updated Monthly*** This section covers current state of technical controls for secure Cloud Computing, and how each address the Cloud Security Alliance Top 7 Threats to Cloud Computing. Implement SaaS encryption as a service If the system is running at the perimeter or in the cloud, encryption can be performed to secure all data at rest. This lab has students leveraging a cloud provider which will supply students with their own cryptographic keys to secure data held within a variety of cloud provider multi-tenant environments. Implement Centralized Management Compliance is a major issue with cloud computing. In this section, students learn what options are available to establish a centralized dashboard and how to maintain compliance with centralized deployments and monitoring capabilities. Build an IDaaS system for our case study This lab will have students learning what can be accomplished with Identity as a Service. We use a leading SaaS offering to create our own SSO solution for employees who wish to access partner-held data.

5 Intrinsec Security Technologies Page 5 Day 3 and 4 (P++) Training Details Pricing The P++ course is a companion course to the Cloud Security Alliance Training which are the first two days (CCSK Plus). The P++ course can be registered as part of the CSA course in a special discounted package, or separately. 4 Day session package $2195: Includes training outlined in this brochure and CCSK Basic and Plus training, including test attempts (a $295 value) and all required paid accounts used throughout the sessions. P++ Only: $1195. Includes content discussed in this brochure. Does not include CCSK test token or access to any official Cloud Security Alliance courseware covered in the first two days. Pre-requisites It is expected that any individuals registering for the P++ session will have already completed their CCSK certification, or have obtained the knowledge of the Plus training session, including working with Amazon Web Services. Discounts All applicable discounts for Cloud Security Alliance training are also applicable for the P++ session. Locations and Dates The P++ course follows up the CCSK Plus training. The same location is used as listed on our course schedule page. Questions? For further questions or to register, please contact us: Phone: [email protected] Web:

6 Intrinsec Security Technologies 2981 Ford Street Extension Suite 259 Ogdensburg, NY Phone: Web:

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK CLOUD MANAGED SERVICES FRAMEWORK E-BOOK TABLE OF CONTENTS 1 Introduction 2 2 Operational Insight 3 3 Cloud Management Process Control 4 4 Infrastructure, Application & Data Security 5 5 Continuous Improvement

More information

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015 Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

From 0 to Secure in 1 Minute APPSEC IL 2015. Moshe Ferber CCSK, CCSP

From 0 to Secure in 1 Minute APPSEC IL 2015. Moshe Ferber CCSK, CCSP From 0 to Secure in 1 Minute APPSEC IL 2015 Moshe Ferber CCSK, CCSP #About Information security professional for over 20 years Popular industry speaker & lecturer (DefCon, BlackHat, Infosec and more) Co-Contributor

More information

How To Create A Virtual Private Cloud On Amazon.Com

How To Create A Virtual Private Cloud On Amazon.Com Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment

More information

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

How to Grow and Transform your Security Program into the Cloud

How to Grow and Transform your Security Program into the Cloud How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management

More information

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,

More information

Proactively Secure Your Cloud Computing Platform

Proactively Secure Your Cloud Computing Platform Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

VMware vcenter Configuration Manager for Virtual Infrastructure Management [V5.X]

VMware vcenter Configuration Manager for Virtual Infrastructure Management [V5.X] VMWARE COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training VMware vcenter Configuration Manager for Virtual Infrastructure Management [V5.X] Course Title VMware vcenter Configuration

More information

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Virtualization Specialist Certification Self-Study Kit Bundle Cloud Virtualization Specialist Certification Bundle A Certified Cloud Virtualization Specialist has proven knowledge and proficiency with the technologies, mechanisms, platforms, and practices based upon

More information

Cloud Computing Training

Cloud Computing Training Cloud Computing Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333 TechAge Labs 2014 version 1.0 Cloud Computing Training Cloud Computing

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

An Introduction to Private Cloud

An Introduction to Private Cloud An Introduction to Private Cloud As the word cloud computing becomes more ubiquitous these days, several questions can be raised ranging from basic question like the definitions of a cloud and cloud computing

More information

Hybrid Cloud Identity and Access Management Challenges

Hybrid Cloud Identity and Access Management Challenges Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,

More information

www.boost ur skills.com

www.boost ur skills.com www.boost ur skills.com AWS CLOUD COMPUTING WORKSHOP Write us at [email protected] BOOSTURSKILLS No 1736 1st Amrutha College Road Kasavanhalli,Off Sarjapur Road,Bangalore-35 1) Introduction &

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Strategic Comparison of Public Cloud versus Hybrid Cloud

Strategic Comparison of Public Cloud versus Hybrid Cloud Wikibon.com - http://wikibon.com Strategic Comparison of Public Cloud versus Hybrid Cloud by David Floyer - 2 April 2015 http://wikibon.com/strategic-comparison-of-public-cloud-versus-hybrid-cloud/ 1 /

More information

Dell Cloud Services. Services

Dell Cloud Services. Services Dell Cloud Services Services The Cloud is Key Foundation of ITaaS Traditional Virtualized Private Cloud Distribution Today Public Cloud Distribution in 3 5 Years A mix of architectures can be employed

More information

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment Presented by: IDG Research Company: CloudPassage June 2015 METHODOLOGY & RESEARCH OBJECTIVES

More information

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive T2 IaaSand PCI Compliance Robert Zigweid, IOActive Introduction Robert M. Zigweid Principal Compliance Consultant at IOActive, Inc. PCI QSA, PCI PA-QSA QSA for Amazon Web Services 2 Creating a PCI Compliant

More information

VMware vcloud Powered Services

VMware vcloud Powered Services SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to

More information

Securing the Physical, Virtual, Cloud Continuum

Securing the Physical, Virtual, Cloud Continuum Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0 Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5

More information

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com A Primer on Cloud Computing By Anand Ganesan Byteonic.com Background Cloud Computing Defined Taxonomy Value Proposition Cloud Providers Who uses it Opportunities for Improvement Agenda The Challenges Make

More information

RightScale mycloud with Eucalyptus

RightScale mycloud with Eucalyptus Swiftly Deploy Private and Hybrid Clouds with a Single Pane of Glass View into Cloud Infrastructure Enable Fast, Easy, and Robust Cloud Computing with RightScale and Eucalyptus Overview As organizations

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

SECURE CLOUD COMPUTING

SECURE CLOUD COMPUTING Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization

I D C T E C H N O L O G Y S P O T L I G H T. S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization I D C T E C H N O L O G Y S P O T L I G H T S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization March 2013 Adapted from Worldwide Datacenter Security 2012 2016 Forecast: Protecting

More information

Hybrid Cloud Computing: Security Aspects and Challenges

Hybrid Cloud Computing: Security Aspects and Challenges Hybrid Cloud Computing: Security Aspects and Challenges Roman Nedzelský [email protected] The Faculty of Informatics and Statistics University of Economics Prague, Czech Republic Abstract Nowadays,

More information

20247D: Configuring and Deploying a Private Cloud

20247D: Configuring and Deploying a Private Cloud 20247D: Configuring and Deploying a Private Course Details Course Code: Duration: Notes: 20247D 5 days This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud Course Code: M20247 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Deploying a Private Cloud Overview This course equips students with the skills they require to configure and

More information

ArcGIS for Server: In the Cloud

ArcGIS for Server: In the Cloud DevSummit DC February 11, 2015 Washington, DC ArcGIS for Server: In the Cloud Bonnie Stayer, Esri Session Outline Cloud Overview - Benefits - Types of clouds ArcGIS in AWS - Cloud Builder - Maintenance

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

MS 20247C Configuring and Deploying a Private Cloud

MS 20247C Configuring and Deploying a Private Cloud MS 20247C Configuring and Deploying a Private Cloud Description: Days: 5 Prerequisites: This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Onboarding VMs to Cisco OpenStack Private Cloud

Onboarding VMs to Cisco OpenStack Private Cloud White Paper Onboarding VMs to Cisco OpenStack Private Cloud This white paper will explain the process for exporting existing virtual machines from either VMware vsphere or AWS EC2 into Cisco OpenStack

More information

vcloud Suite Architecture Overview and Use Cases

vcloud Suite Architecture Overview and Use Cases vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

CLOUD COMPUTING. When It's smarter to rent than to buy

CLOUD COMPUTING. When It's smarter to rent than to buy CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

More information

Implementing Software- Defined Security with CloudPassage Halo

Implementing Software- Defined Security with CloudPassage Halo WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...

More information

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size

More information

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect 1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,

More information

Introduction to OpenStack

Introduction to OpenStack Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa [email protected] Cloud Computing - Definition Cloud Computing is a term coined to refer

More information

List of contributors. Lead Author: Vladimir Baranek, Deloitte

List of contributors. Lead Author: Vladimir Baranek, Deloitte List of contributors Lead Author: Vladimir Baranek, Deloitte Contributors & Reviewers: Kevin L. Jackson NJVC Mari J. Spina, D.Sc. NJVC Allen Stewart Microsoft Antonella Corno Cisco Jason Eden Eucalyptus

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013

More information

Cleveland State University

Cleveland State University SYLLABUS AND COURSE GUIDE Cleveland State University Department of Electrical and Computer Engineering EEC 693 Special topic, Secure Cloud Computing Fall Semester 2015 Instructor: Dr. Abdul Razaque Office:

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Bible Barrie Sosinsky WILEY Wiley Publishing, Inc. About the Author Preface Acknowledgments viii xi xiii Part I: Examining the Value Proposition 1 Chapter 1: Defining Cloud Computing 3

More information

RemoteApp Publishing on AWS

RemoteApp Publishing on AWS RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...

More information

Cloud Security Specialist Certification Self-Study Kit Bundle

Cloud Security Specialist Certification Self-Study Kit Bundle Cloud Security Specialist Certification Bundle CloudSchool.com CLOUD CERTIFIED Technology Professional This certification bundle provides you with the self-study materials you need to prepare for the exams

More information

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014 How to Keep a Cloud Environment Current, Secure and Available October 16, 2014 Brought to you by Vivit Cloud Builders Special Interest Group www.vivit-worldwide.org Hosted by Sumit Sengupta Information

More information

IaaS Configuration for Cloud Platforms

IaaS Configuration for Cloud Platforms vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Evaluation of Cloud ONTAP and AltaVault using AWS

Evaluation of Cloud ONTAP and AltaVault using AWS Evaluation of Cloud ONTAP and AltaVault using AWS July September 2015 Author: Michael Weisz Supervisor: Miroslav Potocky CERN Summer Student Report 2015 Table of Contents 1 Introduction... 2 2 NetApp Cloud

More information

Configuring and Deploying a Private Cloud. Day(s): 5. Overview

Configuring and Deploying a Private Cloud. Day(s): 5. Overview Configuring and Deploying a Private Cloud Day(s): 5 Course Code: M20247 Overview This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

FACING SECURITY CHALLENGES

FACING SECURITY CHALLENGES 24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays

More information

Cloud Computing. ( +971 4 264 4444 7 +971 4 264 8888 * [email protected]

Cloud Computing. ( +971 4 264 4444 7 +971 4 264 8888 * info@etac.ae Cloud Computing Learning Path Workshop 1 : Implementing a Private Cloud Solution : Hands-on Seminar : Cloud as a Business Enabler Workshop 2 : Securing the Cloud : Hands-on Best Practices for Secure Cloud

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Protect Root Abuse privilege on Hypervisor (Cloud Security) Protect Root Abuse privilege on Hypervisor (Cloud Security) Nantharat Puwarang, CISSP Senior Technical Consultant Protect Software Defined Data Center 1 The Road to Software Defined Data Centers: Virtualization

More information

Cloud Computing for Architects

Cloud Computing for Architects Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Configuring and Deploying a Private Cloud Course: MS20247D

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing Software AG and the AWS cloud Past, Present and Best Practices Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing Agenda How Software AG Uses The cloud Software AG s

More information

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified

More information

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model! The agile Cloud Brokerage approach An innovative, business aligned and mature IT services delivery model! CLOUD BROKER DEFINITION as defined by the NIST A Cloud Broker is an entity That manages the selection,

More information

Cloud Architect Certification Self-Study Kit Bundle

Cloud Architect Certification Self-Study Kit Bundle rchitect Certification undle Certified rchitect has demonstrated proficiency in the technology architecture that underlies cloud platforms and cloud-based IT resources and solutions, and has mastered the

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Secure Identity in Cloud Computing

Secure Identity in Cloud Computing Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Compliance in the Age of Cloud

Compliance in the Age of Cloud ANALYST BRIEF Compliance in the Age of Cloud THE GOOD, THE BAD, AND THE UGLY Author Andrew Braunberg Overview Cloud is a nebulous term, but fundamentally, the term denotes that IT resources are delivered

More information

Infrastructure as a Service (IaaS): Market and Forecast for Secure Multitenancy Platforms and Services 2014 2019

Infrastructure as a Service (IaaS): Market and Forecast for Secure Multitenancy Platforms and Services 2014 2019 Brochure More information from http://www.researchandmarkets.com/reports/2763623/ Infrastructure as a Service (IaaS): Market and Forecast for Secure Multitenancy Platforms and Services 2014 2019 Description:

More information

Microsoft Windows Server 2008: Configuring and Troubleshooting Internet Information Services IIS 7.0 6427

Microsoft Windows Server 2008: Configuring and Troubleshooting Internet Information Services IIS 7.0 6427 coursemonster.com/us Microsoft Windows Server 2008: Configuring and Troubleshooting Internet Information Services IIS 7.0 6427 View training dates» Audience This course introduces students to install,

More information

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn) Virtual Private Cloud - Lab Hands-On Lab: AWS Virtual Private Cloud (VPC) 1 Overview In this lab we will create and prepare a Virtual Private Cloud (VPC) so that we can launch multiple EC2 web servers

More information