Cloud Security Training Days 3 and 4 Syllabus



Similar documents
Cloud Courses Description

Cloud Courses Description

NCTA Cloud Architecture

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Third Party Cloud Services Its Adoption in the New Age

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

From 0 to Secure in 1 Minute APPSEC IL Moshe Ferber CCSK, CCSP

How To Create A Virtual Private Cloud On Amazon.Com

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Building Blocks of the Private Cloud

Cloud Security Introduction and Overview

Cloud Essentials for Architects using OpenStack

How to Grow and Transform your Security Program into the Cloud

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Proactively Secure Your Cloud Computing Platform

THE BLUENOSE SECURITY FRAMEWORK

Security Issues in Cloud Computing

VMware vcenter Configuration Manager for Virtual Infrastructure Management [V5.X]

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Computing Training

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

An Introduction to Private Cloud

Hybrid Cloud Identity and Access Management Challenges

ur skills.com

About the VM-Series Firewall

Strategic Comparison of Public Cloud versus Hybrid Cloud

Dell Cloud Services. Services

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

VMware vcloud Powered Services

Securing the Physical, Virtual, Cloud Continuum

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com

RightScale mycloud with Eucalyptus

OVERVIEW. Enterprise Security Solutions

SECURE CLOUD COMPUTING

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

I D C T E C H N O L O G Y S P O T L I G H T. S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization

Hybrid Cloud Computing: Security Aspects and Challenges

20247D: Configuring and Deploying a Private Cloud

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing

Deploy Remote Desktop Gateway on the AWS Cloud

Configuring and Deploying a Private Cloud

ArcGIS for Server: In the Cloud

Bitdefender GravityZone Sales Presentation

MS 20247C Configuring and Deploying a Private Cloud

Deployment Options for Microsoft Hyper-V Server

Onboarding VMs to Cisco OpenStack Private Cloud

vcloud Suite Architecture Overview and Use Cases

CLOUD COMPUTING. When It's smarter to rent than to buy

Implementing Software- Defined Security with CloudPassage Halo

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Introduction to OpenStack

List of contributors. Lead Author: Vladimir Baranek, Deloitte

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cleveland State University

How To Understand Cloud Computing

RemoteApp Publishing on AWS

Cloud Security Specialist Certification Self-Study Kit Bundle

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

IaaS Configuration for Cloud Platforms

Alliance Key Manager Solution Brief

Evaluation of Cloud ONTAP and AltaVault using AWS

Configuring and Deploying a Private Cloud. Day(s): 5. Overview

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

FACING SECURITY CHALLENGES

Cloud Computing. ( * info@etac.ae

Keyword: Cloud computing, service model, deployment model, network layer security.

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Cloud Computing for Architects

Configuring and Deploying a Private Cloud

Cloud Computing. Chapter 1 Introducing Cloud Computing

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

Cloud Architect Certification Self-Study Kit Bundle

Cloud and Data Center Security

Secure Identity in Cloud Computing

Cloud Security Who do you trust?

Compliance in the Age of Cloud

Infrastructure as a Service (IaaS): Market and Forecast for Secure Multitenancy Platforms and Services

Microsoft Windows Server 2008: Configuring and Troubleshooting Internet Information Services IIS

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

Transcription:

November 2012 Intrinsec Security Technologies Cloud Security Training Days 3 and 4 Syllabus A Hands-On Companion Course to Cloud Security Alliance Training.

Page 2 To Order Call: 1-855-732-3348 Day 3 Contents Course Focus The focus of the third day is a natural continuation of the content found in CSA Plus course. The discussions and hands-on activities throughout the day serve to enhance true understanding of cloud technologies delivered in the first two days of training. In this session, we analyze some key topics that will be required when your organization is implementing cloud computing technology. Topics covered include: Virtualization Security This session consists of an expanded discussion of Private Cloud Security Controls discussed in day two, including: VMWare vcloud Architecture This section analyzes the VMWare vcloud infrastructure. We cover the components required within a VMWare-based private cloud system. Hypervisor Security (including types of hypervisors) We investigate industry best practices for hypervisor security and look at the types of hypervisors in the marketplace. Introspection capabilities and benefits Guest Introspection can change the way you secure virtualized workloads. Updating of offline images Coverage of the latest technologies to ensure that images used in our private environment are not vulnerable before they are deployed in production. Zoning versus Air-gapping Virtual Systems This discussion covers high-level architectural design goals.

Intrinsec Security Technologies Page 3 Day 3 Contents (Continued) Virtual Private Clouds From architecture to secure implementation, this session consists of both discussion and hands-on experience with Virtual Private Cloud technology. In the associated labs, students will: Introduction to Virtual Private Cloud This section introduces VPC technology. Upon completion, students understand the differences and limitations of Virtual Private Clouds. Create a Virtual Private Cloud in Amazon Web Services (AWS) Students build up their own VPC and explore key differences between VPC and regular Cloud Computing. Networking in Virtual Private Clouds Students will explore the network options available only within Virtual Private Cloud technology. Some key activities include: Create both public and private subnets in their own Virtual Private Cloud Analyze and modify additional security settings in VPC such as egress filtering and Access Control Lists Automating with Command-Line Tools Work with Amazon Command line tools to rapidly create and terminate server instances. Working with Microsoft Windows Instances This section has students create Windows-Based IaaS systems in AWS.

Page 4 To Order Call: 1-855-732-3348 Day 4 Contents Course Focus The focus of the fourth day is to extend student knowledge of the tools and technologies that can be leveraged by companies to manage and secure Cloud-based systems from an enterprise perspective. In this session, we look at some technologies that can be used to address the Cloud Security Alliance Top 7 Threats to Cloud Computing. After analyzing select technologies, students then implement key Security as a Service (SecaaS) to drive home how others are securing cloud infrastructures. Technical Controls Shootout ***Updated Monthly*** This section covers current state of technical controls for secure Cloud Computing, and how each address the Cloud Security Alliance Top 7 Threats to Cloud Computing. Implement SaaS encryption as a service If the system is running at the perimeter or in the cloud, encryption can be performed to secure all data at rest. This lab has students leveraging a cloud provider which will supply students with their own cryptographic keys to secure data held within a variety of cloud provider multi-tenant environments. Implement Centralized Management Compliance is a major issue with cloud computing. In this section, students learn what options are available to establish a centralized dashboard and how to maintain compliance with centralized deployments and monitoring capabilities. Build an IDaaS system for our case study This lab will have students learning what can be accomplished with Identity as a Service. We use a leading SaaS offering to create our own SSO solution for employees who wish to access partner-held data.

Intrinsec Security Technologies Page 5 Day 3 and 4 (P++) Training Details Pricing The P++ course is a companion course to the Cloud Security Alliance Training which are the first two days (CCSK Plus). The P++ course can be registered as part of the CSA course in a special discounted package, or separately. 4 Day session package $2195: Includes training outlined in this brochure and CCSK Basic and Plus training, including test attempts (a $295 value) and all required paid accounts used throughout the sessions. P++ Only: $1195. Includes content discussed in this brochure. Does not include CCSK test token or access to any official Cloud Security Alliance courseware covered in the first two days. Pre-requisites It is expected that any individuals registering for the P++ session will have already completed their CCSK certification, or have obtained the knowledge of the Plus training session, including working with Amazon Web Services. Discounts All applicable discounts for Cloud Security Alliance training are also applicable for the P++ session. Locations and Dates The P++ course follows up the CCSK Plus training. The same location is used as listed on our course schedule page. Questions? For further questions or to register, please contact us: Phone: 1-855-732-3348 E-Mail: info@intrinsecsecurity.com Web: http://www.intrinsecsecurity.com

Intrinsec Security Technologies 2981 Ford Street Extension Suite 259 Ogdensburg, NY 13669 Phone: 1-855-732-3348 Email: info@intrinsecsecurity.com Web: www.intrinsecsecurity.com