Cloud Security

$205.00

CECs

2

This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing an organization’s risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.

 

Course Highlights

Describe the objectives of information security and how they relate to the cloud
Describe the challenges associated with cloud security
Describe the three models for public cloud security responsibilities
Describe relevant ISO standards for information security
Describe the Security as a Service model
Describe the security risk areas for cloud computing
Describe how to assess security offerings for cloud services
Describe the challenges associated with security in a Software as a Service or SaaS offering
Describe the best practices for securing a Software-as-a-Service or SaaS offering
Describe secure software development practices
Describe the Jericho Forum Cloud Cube Model for defining cloud characteristics
Describe the considerations for infrastructure security in cloud computing
Describe the host-level security considerations in cloud computing
Describe considerations for security virtualization hosts in a cloud environment
Describe application-level security in cloud computing
Describe the measures to secure data at rest and data in transit
Describe how to perform risk assessment in a cloud environment
Describe the service-level agreements for cloud security
Describe the measures to secure data and connection in a cloud environment

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is recommended for ICT and IT professionals who are interested in learning about security and cloud computing.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

Two-hour self-paced course with 90 days from the date of purchase to complete