November 2012 Intrinsec Security Technologies Cloud Security Training Days 3 and 4 Syllabus A Hands-On Companion Course to Cloud Security Alliance Training.
Page 2 To Order Call: 1-855-732-3348 Day 3 Contents Course Focus The focus of the third day is a natural continuation of the content found in CSA Plus course. The discussions and hands-on activities throughout the day serve to enhance true understanding of cloud technologies delivered in the first two days of training. In this session, we analyze some key topics that will be required when your organization is implementing cloud computing technology. Topics covered include: Virtualization Security This session consists of an expanded discussion of Private Cloud Security Controls discussed in day two, including: VMWare vcloud Architecture This section analyzes the VMWare vcloud infrastructure. We cover the components required within a VMWare-based private cloud system. Hypervisor Security (including types of hypervisors) We investigate industry best practices for hypervisor security and look at the types of hypervisors in the marketplace. Introspection capabilities and benefits Guest Introspection can change the way you secure virtualized workloads. Updating of offline images Coverage of the latest technologies to ensure that images used in our private environment are not vulnerable before they are deployed in production. Zoning versus Air-gapping Virtual Systems This discussion covers high-level architectural design goals.
Intrinsec Security Technologies Page 3 Day 3 Contents (Continued) Virtual Private Clouds From architecture to secure implementation, this session consists of both discussion and hands-on experience with Virtual Private Cloud technology. In the associated labs, students will: Introduction to Virtual Private Cloud This section introduces VPC technology. Upon completion, students understand the differences and limitations of Virtual Private Clouds. Create a Virtual Private Cloud in Amazon Web Services (AWS) Students build up their own VPC and explore key differences between VPC and regular Cloud Computing. Networking in Virtual Private Clouds Students will explore the network options available only within Virtual Private Cloud technology. Some key activities include: Create both public and private subnets in their own Virtual Private Cloud Analyze and modify additional security settings in VPC such as egress filtering and Access Control Lists Automating with Command-Line Tools Work with Amazon Command line tools to rapidly create and terminate server instances. Working with Microsoft Windows Instances This section has students create Windows-Based IaaS systems in AWS.
Page 4 To Order Call: 1-855-732-3348 Day 4 Contents Course Focus The focus of the fourth day is to extend student knowledge of the tools and technologies that can be leveraged by companies to manage and secure Cloud-based systems from an enterprise perspective. In this session, we look at some technologies that can be used to address the Cloud Security Alliance Top 7 Threats to Cloud Computing. After analyzing select technologies, students then implement key Security as a Service (SecaaS) to drive home how others are securing cloud infrastructures. Technical Controls Shootout ***Updated Monthly*** This section covers current state of technical controls for secure Cloud Computing, and how each address the Cloud Security Alliance Top 7 Threats to Cloud Computing. Implement SaaS encryption as a service If the system is running at the perimeter or in the cloud, encryption can be performed to secure all data at rest. This lab has students leveraging a cloud provider which will supply students with their own cryptographic keys to secure data held within a variety of cloud provider multi-tenant environments. Implement Centralized Management Compliance is a major issue with cloud computing. In this section, students learn what options are available to establish a centralized dashboard and how to maintain compliance with centralized deployments and monitoring capabilities. Build an IDaaS system for our case study This lab will have students learning what can be accomplished with Identity as a Service. We use a leading SaaS offering to create our own SSO solution for employees who wish to access partner-held data.
Intrinsec Security Technologies Page 5 Day 3 and 4 (P++) Training Details Pricing The P++ course is a companion course to the Cloud Security Alliance Training which are the first two days (CCSK Plus). The P++ course can be registered as part of the CSA course in a special discounted package, or separately. 4 Day session package $2195: Includes training outlined in this brochure and CCSK Basic and Plus training, including test attempts (a $295 value) and all required paid accounts used throughout the sessions. P++ Only: $1195. Includes content discussed in this brochure. Does not include CCSK test token or access to any official Cloud Security Alliance courseware covered in the first two days. Pre-requisites It is expected that any individuals registering for the P++ session will have already completed their CCSK certification, or have obtained the knowledge of the Plus training session, including working with Amazon Web Services. Discounts All applicable discounts for Cloud Security Alliance training are also applicable for the P++ session. Locations and Dates The P++ course follows up the CCSK Plus training. The same location is used as listed on our course schedule page. Questions? For further questions or to register, please contact us: Phone: 1-855-732-3348 E-Mail: info@intrinsecsecurity.com Web: http://www.intrinsecsecurity.com
Intrinsec Security Technologies 2981 Ford Street Extension Suite 259 Ogdensburg, NY 13669 Phone: 1-855-732-3348 Email: info@intrinsecsecurity.com Web: www.intrinsecsecurity.com