Szkolenia HPE

Cel szkolenia szkolenie zdalne - dlearning

kod: H8P76S

This course slices through the hyperbole and provides students with the practical knowledge to understand the real cloud security issues and solutions. The course provides a comprehensive review of cloud security fundamentals, including a detailed description of cloud computing. It covers all major domains in the latest guidance document from the Cloud Security Alliance, as well as the recommendations from the European Network and Information Security Agency (ENISA).

Throughout the training, students assess, build, and secure a cloud infrastructure through hands-on labs using Amazon Cloud.

This course prepares students for the Cloud Security Alliance CCSK certification exam

Course objectives

The objective of this course is to provide students with a base of knowledge on cloud computing security theory and practice, and to assist students in taking the CCSK exam.

Audience

This class is for security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.

Plan szkolenia Rozwiń listę

  • Module 1: Introduction and Cloud Architectures
    • Define cloud computing and its business benefits
    • List the attributes that define cloud computing
    • Identify pros and cons of cloud computing choices
    • Discuss the different components of the cloud computing stack
    • Differentiate service models and deployment models
    • Describe individual service models and how they operate
    • Describe individual deployment models and how they operate
    • Discuss shared responsibility for security across models
    • Identify cloud impact on related technologies that rely on cloud, or are commonly seen in cloud deployments
  • Module 2: Infrastructure Security for Cloud
    • Discuss the security advantages and disadvantages of working with virtual infrastructure
    • Discuss how to secure the cloud management plane
    • Understand the components of cloud infrastructure
    • Assess the security implications of virtual networks and workloads
    • Discuss the security advantages and disadvantages of working with virtual infrastructure
    • Describe how to secure virtual networking
    • Describe how to secure virtual workloads during creation, use, movement, and destruction
  • Module 3: Managing Cloud Security and Risks
    • List the key elements of information security governance related to cloud operations
    • Review the implications of cloud on governance, with a focus on contracts and controls
    • Identify strategies to manage provider governance
    • Describe the steps in the risk management lifecycle specifically for moving to the cloud
    • Differentiate risk treatment and implementation responsibility across service models
    • Identify the tools of governance
    • Manage compliance and audits for cloud deployments.
    • Discuss tools from the Cloud Security Alliance to help assess and manage risk
    • Identify legal responsibilities based on business compliance, regulations, and geography
    • Discuss contractual elements that support compliance and verification
    • Identify jurisdiction and regulation requirements
    • Describe legal ramifications and procedures for legal accountability
    • Describe types of audit and how to plan for them
    • List required artifacts for auditing
    • Describe how to handle the results of an audit
    • Discuss SLAs and setting expectations around what the customer does versus what the provider does (the most important aspect of incident response for cloud-based resources)
    • Use functions, actors, and locations to identify cloud security issues, and specific controls to address security and governance
    • Review the data security lifecycle in the cloud
  • Module 4: Data Security for Cloud • Understand business continuity and disaster recovery in the cloud
    • Define security issues for data in the cloud
    • Assess the role and effectiveness of access controls
    • Describe data security lifecycle for cloud use
    • Discuss data encryption and key management
    • Describe forms of data loss prevention
  • Module 5: Securing Cloud Applications and Users
    • Discover how application security differs in cloud computing
    • Review secure software development basics and how they change in the cloud
    • Leverage cloud capabilities for more secure cloud applications
    • Describe the importance of standard interfaces and the potential costs of vendor lock-in
    • Define the application architecture, design, and operations lifecycle
    • Discuss the impact of cloud operations on SDLC and identify threat modeling requirements
    • Differentiate static and dynamic testing methods and give examples of each
    • Examine application security tools and vulnerability management processes
    • Define identity, entitlement, and access management terms
    • Differentiate between identity and access management
    • List best practices in provisioning identity and entitlement
    • Describe how to build an entitlement matrix
    • Differentiate between authentication, authorization, and access control
    • Describe architectural models for provisioning and how to integrate them
    • Describe the operation of federated identity management
    • List key identity management standards and how they facilitate interoperation
  • Module 6: Cloud Security Operations • Identify challenges in incident response when working with a cloud provider at various service levels
    • Understand why cloud incidents need to be handled differently
    • Explain the incident response lifecycle
    • Define SECaaS
    • List advantages and concerns for SECaaS
    • Describe various forms of security offered as services
    • Identify cloud impact on related technologies that rely on cloud or are commonly seen in cloud deployments
  • Labs
    • Core account security
    • IAM and monitoring in-depth
    • Network and instance security
    • Encryption and storage security
    • Application security and federation
    • Risk and provider assessment lab
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne

We recommend attendees have at least a basic understanding of security fundamentals, including firewalls, secure development, encryption, and identity management.

Poziom trudności
Czas trwania 2 dni
Certyfikat

The course gives students a comprehensive review of cloud security fundamentals and prepares them for the Cloud Security Alliance CCSK certification exam. The course includes an exam voucher from the Cloud Security Alliance for the CCSK certification exam.

Prowadzący

Authorized HPE Trainer.

Pozostałe szkolenia HPE | Security

Formularz kontaktowy

Prosimy o wypełnienie poniższego formularza, jeśli chcą Państwo uzyskać więcej informacji o powyższym szkoleniu.






* pola oznaczone (*) są wymagane

Informacje o przetwarzaniu danych przez Compendium – Centrum Edukacyjne Spółka z o.o.

CENA 7900 PLN NETTO

FORMA SZKOLENIA ?

 

MATERIAŁY SZKOLENIOWE ?

 

WYBIERZ TERMIN SZKOLENIA

    • Informacje ogólne
    • Termin gwarantowany
    • Last minute (-10%)
    • Język obowiązujący na szkoleniu
    • Język polski
    • Język angielski
    • Informacje ogólne
    • Termin gwarantowany
    • Last minute (-10%)
    • Język obowiązujący na szkoleniu
    • Język polski
    • Język angielski
Zarezerwuj termin szkolenia
zamknij

Szkolenie stacjonarne

Szkolenia stacjonarne w Compendium CE odbywają się najczęściej w naszych lokalizacjach w Krakowie i Warszawie, ale także w miejscu ustalonym przez klienta. Grupa uczestnicząca w szkoleniu spotyka się w danym miejscu o określonym czasie i wraz z trenerem aktywnie uczestniczy w laboratoriach.

Szkolenie dlearning

W szkoleniach Compendium Distance Learning możesz uczestniczyć z dowolnego miejsca na świecie. Kursanci, dzięki zaawansowanej technologii, którą dostarcza Compendium CE, stale widzą i słyszą trenera, mogą mu zadawać pytania poprzez chat i mikrofon, a także uczestniczą w ćwiczeniach i laboratoriach, które rozwiązują wraz z prowadzącym. Po więcej informacji zajrzyj na stronę dlearning.eu

zamknij

Materiały papierowe

Materiały tradycyjne: cena zawiera standardowe materiały wydawane w postaci książek papierowych, drukowanych lub innej, w zależności od ustaleń z producentem.

Materiały elektroniczne

Materiały elektroniczne: są to materiały szkoleniowe w wersji elektronicznej, które w zależności od dostawcy udostępniane są za pomocą dedykowanych aplikacji: Skillpipe, eVantage itd. lub w postaci dokumentów PDF.

Materiały ctab

Materiały ctab: cena zawiera tablet ctab oraz materiały szkoleniowe w formie elektronicznej bądź tradycyjne materiały szkoleniowe i materiały dodatkowe dostarczone w wersji elektronicznej w zależności od ustaleń z producentem (w postaci dokumentów PDF lub EPUB). Tak dostarczone materiały są przystosowane pod kątem wyświetlania ich na tablecie ctab. Po więcej informacji zajrzyj na stronę ctab.

Najbliższe szkolenia HPE

Harmonogram szkoleń HPE