coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?


Please select a Location.


course photo

Cloud Security

Gurukul, Ahmedabad


No Feedback Yet

No Reviews Yet
0 Interested

About the Course

Program Focus:
By the end of the course the participants will be able to find answers for the following:
• What are the characteristics of cloud computing?
• Know some techniques for securing public cloud instances
• Which third party risk management practices should you apply to cloud provider engagements?
• How is cloud computing different from outsourcing?
• What should you be looking for in a SAS 70 Type II or SSAE 16 audit statement?
• What are the six phases of the data security lifecycle?
• Which practices help in porting platform as a service (PaaS) solutions?
• How can cloud providers minimize risks of insider abuse?
• How can a cloud customer predict whether the cloud providers availability and performance will meet service level agreement commitments?
• What capabilities can a cloud provider deliver to support offline analysis of potential incidents?
• What are key success factors to support application security in Infrastructure as a Service (IaaS) environments?
• How can key management be used to prevent cloud providers from inappropriately accessing customer data?
• Which prominent standards should be considered to federate customer identity management systems with cloud providers?
• Why do communications between multiple virtual machines in a private cloud often evade tradition security monitoring systems?
Who Should Attend:
The program is restricted to participants who have basic understanding of security fundamentals, firewalls, secure development, encryption, and identity management.
Some basic knowledge that is a prerequisite for successfully following the Cloud Security course:
• You can give examples of computer hardware
• You have a basic idea of techniques of data encryption
• You have heard about some of the promises of cloud computing.
• You know that E-mail, word processing, ERM and CRM are computer applications
• You can name some different web browsers
• You know that Windows and Linux are operating systems
• You know the difference between a website and a server
• You can describe what a software developer does
• You have some experience in using the internet
• You understand the basic difference between a processor, hard-disk storage and the network
• You have used computers in your work
• You can describe some of the tasks of an IT department

Topics Covered

Program Contents:
• Domain 1 - Cloud Architecture
• Domain 2 - Governance and Enterprise Risk
• Domain 3 - Legal and Electronic Discovery
• Domain 4 - Compliance and Audit
• Domain 5 - Information Lifecycle Management
• Domain 6 - Portability and Interoperability
• Domain 7 - Traditional Security, BCM, D/R
• Domain 8 - Data Center Operations
• Domain 9 - Incident Response
• Domain 10 - Application Security
• Domain 11 - Encryption and Key Management
• Domain 12 - Identity and Access Management
• Domain 13 - Virtualization
ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
• Security benefits of cloud
• Risks and underlying vulnerabilities
• Information assurance framework
• Division of liabilities
• Key legal issues
• Applied Knowledge
• Classify popular cloud providers into S-P-I model
• Redundancy
• Securing popular cloud services
• Vulnerability assessment considerations
• Practical encryption use cases

Who should attend

This workshop will significantly benefit professionals responsible for security in a cloud computing environment.
• IS / IT Specialist / Analyst / Manager
• IS / IT Auditor / Consultant
• IS / IT Head / Director
• IT Operations Manager / Head / Director
• IT Compliance Manager / Head / Director
• Security Head / Director
• Security Specialist / Analyst / Manager / Architect
• Security Consultant / Professional / Officer
• Security Engineer / Administrator / Auditor
• Network Specialist / Analyst / Manager
• Network Consultant / Professional / Architect / Administrator
• Senior Systems Engineer
• Systems Analyst / Administrator



What you need to bring


Key Takeaways

There are no Reviews yet.
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

There are no Reviews yet.

About the Trainer

Our Consultant picture

Our Consultant


Our consultant is an MTech and Doctorate in Management Studies with a total of 12 years experience. She is a CompTIA certified cloud trainer and EXIN accredited cloud certification trainer.
Our consultant has published and presented the following technical papers on various conferences & won several awards & accolades:
1. "Cloud Security as a tool and as the next best business strategy"
2. "The effect Cloud Security on the traditional business model"
3. "Cloud Security services, providers, and Indian initiatives for low cost cloud Security"
4. "Performance Solutions for Modernization of Legacy Systems"
5. "A Device sensitive, Dynamic, Multi Layered Security Model for Cloud Security"
Our consultant is a passionate trainer and has delivered corporate trainings to various clients like L&T, IBM, Airtel, Microsoft, Deutsche Bank, Honeywell and many more on various subjects like Cloud Security, Virtualization, Advanced Networks Technology & Management, Advanced computer architecture and algorithm, Operating Systems, Advanced Digital Communication, Information security, Network Programming, Parallel Security and Distributed Security, Computer Organization and Architecture, Algorithms, Cryptography, Data Mining and Data Warehousing.
Our consultant has also published two research papers in International conferences and is a visiting Professor for several reputed Colleges & Universities.

Course Id: 9569