Leading Cloud Security Design and Implementation
While the cloud environment may appear similar to running a traditional IT environment on the premises, the cloud solutions protection requirements are in fact very different because the traditional network perimeter is no longer the best line of defense, and the threat vectors are not the same. Effective defense of the organization’s cloud environment requires significant planning and governance by a well-informed management team. This course provides the information security leader’s need to drive a secure cloud model and leapfrog on security to leverage the security capabilities in the cloud.
Course Key Learnings:
- Define a strategy for securing a workload in the cloud for medium and large enterprises that can support their business objectives
- Establish a security roadmap based on the security strategy that can support a fast-paced cloud adoption and migration path while maintaining a high degree of security assurance
- Understand the security basics of the cloud environment across different types of service offerings, then explain and justify to other stakeholders the decisions within the security roadmap
- Build an effective plan to mature a cloud security posture over time, leveraging security capabilities offered by cloud providers to leapfrog in security capabilities
- Explain the security vision of the organization in the Cloud domain to your Board Directors and executives, collaborate with your peers, and engage your workforce, driving the security culture change required for the cloud transformation
Course Content:
Module1: Securing Workload and Security Assurance
Overview
Organizations are often challenged with the question of whether the cloud environment is meeting up to the security expectations, and whether it has vulnerabilities. The material on security assurance helps students to lead the building a security assurance program for cloud environment using automation as a basis of operations.
Multicloud is a natural progression to Cloud adoption. We cover the necessary management principles to successfully navigate through the complex security management of a multi-cloud environment.
Cloud adoption is a long-term process. We arm you with the information to drive the changes required by measuring the cloud security posture and using metrics to aid in making the right decisions.
Exercises
- Application secrets management
- Security benchmarking
- Security Metrics
Topics
Securing Application / Workload
- Cloud Application Practices
- Security Protection Services
- Cloud Workload Assessment
Security Assurance
- Posture Validation
- Regulatory Compliance
- Security Testing
Workforce Transformation
- Skill Readiness
- Organization Alignment
Multi-cloud management
Module2:Cloud Technical Protection and Monitoring
Overview
The second section is dedicated to managing the technology aspect of the cloud environment. Securing cloud technology is rather different than securing technologies on-premise. This section will highlight the difference and discuss the capabilities and competencies that matter the most.
Students will learn about secure infrastructure and architecture first which includes key topics such as configuration management, resource management, and network controls. Students will learn how to lead their respective organization on driving iterative improvements in these domains over time which helps to improve defenses over time.
Exercises
- Cloud Container security
- Logging and monitoring
- Encryption in Cloud
Topics
Secure Infrastructure and Architecture
- Configuration Management
- Image Management
- Cloud Secure Architecture
- Resource Management
- Network Controls
Security Detection and Response
- Log Management
- Security Intelligence
- Analysis and Monitoring
- Response
Data Protection
- Data Encryption
- Data Classification and Protection
- Data Backup and Resiliency
Module3: Security Program Design, Governance, and Identity Management
Overview
The first section of the course aims to help management professionals develop a migration roadmap to the cloud environment. The goal of the roadmap is to support the business transformation to realize the benefits from the cloud, while maintaining the security of the environment, applications, and data. We will arm you with information on various approaches to migratory and preparatory steps to get you ready for a secure migration journey.
We will then pivot over to the topic of security governance to provide the details to help you understand how to build up security governance in enterprise context. Not only do we provide you with the best practices in the governance area, we also provide the progressive approaches to build up security maturity as well.
We end the section covering a new security perimeter paradigm – the Identity and Access Management. With the modern Cloud architecture, we are losing the firewall and network perimeter as our main battle line. The transition from network centric to identity centric security perimeter requires a fundamentally different culture and mindset to effective management. We cover the key objectives and the common paths to gain security maturity.
Exercises
- Secure Roadmap Development
- Migration Preparation
- IAM Secure Setup
Topics
Introduction to Cloud
- Shared Responsibilities in Cloud
- Infrastructure as a Service
- Platform as a Service
- Software as a Service
Transition Process and Planning
- Methods of Adoption
- Leveraging the Cloud Adoption Framework
Security Governance
- Cloud Governance Committee
- Cost Management
- Security Policy
Identity Access Management
- Segregation
- Identity Management
- Access Management
Prerequisites
- Students should have three to five years of experience in IT and/or cybersecurity.
- This course covers the core areas of security leadership in migrating workloads to the cloud environment and assumes a basic understanding of technology, networks, and security.
International Student Fee: 850 US$
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Stay connected even when you’re apart
Join our WhatsApp Channel – Get discount offers
500+ Free Certification Exam Practice Question and Answers
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
Join Internships and Referral Program (click for details)
Work as Freelancer or Full-Time Employee (click for details)
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Security Strategic Planning, Policy, and Leadership