CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST



Similar documents
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

CAST Center for Advanced Security Training

Security Issues in Cloud Computing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Essentials for Architects using OpenStack

Cloud Courses Description

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

SECURE CLOUD COMPUTING

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cloud Courses Description

How To Protect Your Cloud Computing Resources From Attack

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

FACING SECURITY CHALLENGES

How To Protect Your Cloud From Attack

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud Security Who do you trust?

Public Cloud Workshop Offerings

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Security and Managing Use Risks

Hackers are here. Where are you?

Public Cloud Security: Surviving in a Hostile Multitenant Environment

How to ensure control and security when moving to SaaS/cloud applications

PROMAPP TECHNICAL INFORMATION

Course Title: Virtualization Security, 1st Edition

Networking: EC Council Network Security Administrator NSA

Five keys to a more secure data environment

Evaluating IaaS security risks

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Certified Secure Computer User

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud-Security: Show-Stopper or Enabling Technology?

CLOUD COMPUTING. When It's smarter to rent than to buy

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

Keyword: Cloud computing, service model, deployment model, network layer security.

Module 1: Facilitated e-learning

Data Protection: From PKI to Virtualization & Cloud

Top 10 Cloud Risks That Will Keep You Awake at Night

NCTA Cloud Architecture

Security Issues in Cloud Computing

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February

EXIN Cloud Computing Foundation

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

How-To Guide: Cyber Security. Content Provided by

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing: Risks and Auditing

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Introduction to Cyber Security / Information Security

CloudCheck Compliance Certification Program

Journey to the Private Cloud. Key Enabling Technologies

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

IBM EXAM QUESTIONS & ANSWERS

Hackers are here. Where are you?

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

Cloud Computing: A Practical Approach

A Survey on Cloud Security Issues and Techniques

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Enterprise Architecture Review Checklist

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Hosted SharePoint: Questions every provider should answer

Cloud Computing. ( * info@etac.ae

DOBUS And SBL Cloud Services Brochure

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Internet threats: steps to security for your small business

The increasing popularity of mobile devices is rapidly changing how and where we

HARNESSING THE POWER OF THE CLOUD

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

EC Council Certified Ethical Hacker V8

Interoperate in Cloud with Federation

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Cloud Security Who do you trust?

Security & Cloud Services IAN KAYNE

Secure Identity in Cloud Computing

Cloud Security:Threats & Mitgations

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

SERENA SOFTWARE Serena Service Manager Security

Cloud Security Specialist Certification Self-Study Kit Bundle

Transcription:

CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security

About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. courses are advanced and highly technical training programs co-developed by EC-Council and well-respected industry practitioners or subject matter experts. aims to provide specialized training programs that will cover key information security domains, at an advanced level.

Designing and Implementing Cloud Security Course Description Most businesses around the world, small and large, use multiple cloud services to handle business-critical data. Though cloud services offer improved efficiency, reduced costs, greater accessibility and flexibility, they also increase security risk. Cloud leaders focus on measures to reduce data breaches, maintain confidentiality, and preserve integrity, authenticity and completeness. Other areas of concern are risk factors associated with virtual machines, vulnerabilities from shared resources, and issues with encryption. Recent hacking attacks on Dropbox, Google s DNS, LinkedIn, etc. are only indications of larger threats to cloud services and data security. According to McAfee Labs 2014 Threats Predictions report, deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals. The Designing and Implementing Cloud Security course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. The course will help professionals understand the risks and threats associated with cloud service adoption and migrating business-critical data to third party systems. The program covers planning, designing, and implementing cloud security controls. It delves in to various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, fail-over policy, and how cloud security strengthens the business case for cloud adoption.

Designing and Implementing Cloud Security The Program Addresses Critical Cloud Governance, Risk Management, and Compliance (GRC) Issues Encryption Key Management Identity and Access Management Privacy Breach Cloud Forensics Penetration Testing The Designing and Implementing Cloud Security course prepares IT and business leaders to address the risks and challenges of cloud adoption.

What Will You Learn? After completing this course, students will learn: Fundamentals of cloud computing, cloud services, its characteristics, benefits, and applications Cloud computing service models, deployment models and security considerations of cloud computing Secure cloud computing environment design Data center, online storage options, cloud based server capacity, and cloud server virtualization Cloud computing standards

Cloud uptime, optimizing cloud performance, availability and its characteristics Cloud fault tolerance, load balancing, and cloud failover policies Best practices of virtualization and cloud implementation Cloud security, cloud security control layers, encryption and key management, identity access management, federated identity management, and IAM standards for consumers Cloud configuration management, patching modes, standardized policy creation, and cloud-based patch management tools Cloud computing risk assessment and cloud penetration testing Intrusion detection systems (IDS) in a cloud environment Types of attacks on a cloud environment and techniques to overcome attacks Legal issues such cloud computing contracts, vendor transitioning, auditing cloud data, maintaining privacy and confidentiality, geographic jurisdiction, limitations on vendor liability, and taxation challenges Compliance to established industry standards, acts, and laws including PCI-DSS, HIPAA, Sarbanes-Oxley, and Data Protection Act

Who Should Attend IT Security Managers Cloud Security Professionals Entrepreneurs Database and Web Developers Security Auditors and Compliance Managers Network and System Administrator Duration 3 days (9:00 5:00)

Course Outline Module 01: Fundamentals of Cloud Computing Cloud Computing Cloud Computing Characteristics Benefits of Cloud Computing Economics of Cloud Computing Application of Cloud Computing in Various Domains Cloud Computing for Enterprises Linux Security Countermeasures Cloud Computing Service Models Cloud Deployment Models Private Cloud Computing Public Cloud Computing Hybrid Cloud Computing Community Cloud Computing Cloud Computing Service Model Applications Challenges in Cloud Computing Adoption Major Barriers to Cloud Computing Adoption 7 Steps for Migrating Services to Cloud What Should Not be Moved to the Cloud Cloud Computing Security Risks Cloud Computing Attacks Cloud Computing Security Considerations Cloud Security Best Practices Case Study

Module 02: Designing a Secure Cloud Computing Environment Layers of Cloud Computing Single and Multi-Tenancy Environments Cloud SLA Service Oriented Architecture Cloud Deployment Requirements Cloud Networking Monitoring Performance Communication Requirements for Cloud Cloud Security Physical vs. Virtual Security Cloud Application Security Best Practices Prerequisites for Building your Cloud Infrastructure Cloud Computing Reference Architecture, Models and Framework Cloud Cube Model Types of Data Centers Cloud Storage Networks Cloud Computing Providers Google s Cloud Build, Debug and Deploy Apps for Google App Engine using exo Cloud IDE Open Source Data Center and Cloud Software Pros and Cons in Deploying Open- Source Cloud Systems Cloud-based Server Capacity Cloud Server Capacity Providers Do s and Don ts of Cloud-based Server Capacity Cloud Server Virtualization Cloud Capacity Planning Tool: Server File System Analytics Utility: CopperEgg Xeround Cloud Database for MySQL Applications Data Center Design Standards Data Center and Cloud Cloud Computing and Cloud Storage

Module 03: Cloud Computing Standards Why Cloud Environment Need Standards? Benefits of Standardized Policies Cloud Ecosystem and Standards Role of Cloud Standard Organizations Standards Development Organizations in Cloud Computing

Module 04: Cloud Uptime and Availability Terminology Data Backup on Cloud Cloud Outage/Failure and Cloud Backup and Disaster their Impacts Recovery Benefits Lessons to be Learnt from Cloud Outages Rackspace Cloud Load Balancer Control Panel Importance of Uptime High Availability Definition Guarantee Fault Tolerance Load Balancing Solutions Recommendations for Fault Tolerance Techniques Best Practices for Optimal HAProxy - The Reliable, Maximizing Uptime Pingdom Cloud Uptime Monitoring High Performance TCP / HTTP Load Balancer Tools Cloud Failover Policy Cloud Availability SaaS-Specific Rider Recommendations PaaS-Specific Rider IaaS-Specific Rider Geminare s Cloud for Cloud Providers to Improve Availability Recommendations for Cloud Users to Improve Availability Recovery/Auto Failover Load Balancing Cloud Performance

Module 05: Virtualization on Cloud Virtualization Terminologies Introduction to Virtualization Virtualization Vendors Importance of Virtualization Datacenter & Cloud Infrastructure Product: vsphere Characteristics of Virtualization Virtualization Vendors Virtualization Techniques Virtualization Security Best Practices for Administrators Type 1 and Type 2 Hypervisors Why we need Virtualization for Cloud? Best Practices for VM Security

Module 06: Cloud Security What is Cloud Security? Top Ten Threats to Cloud Security Data Breach Data Loss Account Hijacking Insecure Interfaces and APIs Denial-of-Service (DoS) Malicious Insiders Abuse of Cloud Services Password Cracking Services on Cloud Insufficient Due Diligence Shared Technology Issues Unknown Risk Profile Cloud Sprawl Cloud Security Controls Cloud Security Control Layers Placement of Security Controls in the Cloud Cloud Security is the Responsibility of both Cloud Provider and Consumer Encryption and Key Management Tips to Protect Encryption Keys Enhancing Encryption Strength: Hardware/Software Protection Identity and Access Management (IAM) Securing Identity Provisioning Securing Authentication in Saas and Paas Environments Securing Authentication in Saas and IDaaS Environments Federated Identity Management Securing Federated Identity Management Securing Access in Clouds Using Security Assertion Markup Language (SAML) for Federated Single Sign-on Using Service Provisioning Markup Language (SPML) for IAM Using exensible Access Control Markup Language (XACML) for IAM Using Open Authentication (OAuth) for IAM IAM Standards for Consumers CloudPassage Cloud Security Vendors Best Practices for Securing Cloud

Module 07: Cloud Configuration and Patch Management Cloud Configuration Management Cloud Configuration Management Approaches VMware vcenter Configuration Manager NephoScale s Configuration Management Configuration Management Systems Patch Management Challenges in Cloud Vulnerable Areas that need Patch in Cloud Patch Management Process Workflow Patch Management Process Flow Overview Patch Management Process Major Challenges to the Patch Management Flow Key Considerations for Patch Management in Cloud Creating Standardized Patch Management Policies Cloud-based Patch Management tools Checklist for Selecting a Cloud Patch Service Provider

Module 08: Penetration Testing and Risk Assessment Cloud Computing Risk Assessment Cloud Computing Risk Categories Risk Assessment Metrics What is Cloud Pen Testing? Why Penetration Testing? Penetration Test vs. Security Assessment Phases of Penetration Testing Key Considerations for Pen Testing in the Cloud Scope of Cloud Pen Testing Cloud Penetration Testing Steps Recommendations for Cloud Testing Introduction to Virtualization Prerequisites to Virtual Machine Pen Testing Virtual Environment Pen Testing Virtual Machine Penetration Testing Steps Vulnerability Assessment Tool Configuration Management Tools Virtualization Assessment Toolkit Virtualization Best Practices

Module 09: Cloud Computing Legal Issues Key Legal Issues Cloud Computing Contracts General Terms used in Cloud Contracts Non Negotiable Contracts Issues with Sub Contracts Business Continuity Issues Interoperability Issues Getting through SLAs Vendor Transitioning Tracking and Auditing Cloud Data Privacy and Confidentiality Geographic Jurisdiction Limitations on Vendor Liability Ending the Arrangement Compliance and Audit Compliance Contract Challenges Recommendations for Compliance and Audit Taxation Challenges Cloud Computing Legal Checklist Checklist for Invalidating Legal Issues in Cloud Provider Selection 9 Questions to Ask Before Signing a Cloud Computing Contract 9 Best Practices for Cloud Computing Contracts Cloud Computing Acts

Module 10: Using iphones, Tablets and other devices to Access Cloud Mobile Cloud Computing (MCC) Mobile Cloud Computing Applications Operating Systems for Smartphones Mobile Web Browsers Cloud Apps on Smartphones Benefits of Mobile Access to Cloud Limitations of Mobile Access to Cloud Mobile Virtualization Platform (MVP) Mobile E-commerce Security Checkpoints Virtual Terminal Working of a Virtual Terminal Virtual Terminal Security Benefits Mobile Cloud Collaboration Applications iphone apps for Business Collaboration Android apps for Collaboration Mobile Spy Stolen Mobile Tracking Software Threats of Mobile Malware Mobile Cloud Threats and Countermeasures Mobile Client Security Software How to Set a Passcode on Lock Screen of iphone 5 Secured Mobile Cloud Access Mobile Device Security Guidelines for Administrator General Guidelines for Mobile Platform Security Best Practices for Secured Mobile Cloud Access

Master Trainer: Haja Mohideen VP- TECHNOLOGY, EC- COUNCIL Mr. Haja Mohideen is the VP- Technology and Co-Founder of EC-Council. He manages the certifications and training programs for EC-Council, and leads the product development team. He is known worldwide as the creator of the popular EC-Council certification programs Certified Ethical Hacker (C EH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified System Analyst / Licensed Penetration Tester (ECSA/LPT) and EC-Council Certified Secure Programmer (ECSP), among others. Haja has 17 years of experience specializing in the development, support and project management of PC software and hardware. He has trained various Fortune 500 companies as well as US government agencies. He is also the Master Trainer for EC-Council courses, and his training is often sought after globally. He has led training in many countries including Greece, India, USA, Indonesia, Singapore, England, Mexico, amongst others. Haja is also one of few who are qualified to conduct train the trainer sessions for EC-Council courses. Haja holds a Masters Degree in Software Engineering and has numerous industry-wide IT certifications from Microsoft, IBM, Cisco, Motorola, 3COM, Adobe, Intel and many others. He carries over 90 vendor certifications.