Cloud Management and Security: Principles and Best Practices
Select Other "city & date"
Cloud Management and Security: Principles and Best Practices Course
Introduction:
Cloud computing has rapidly emerged as a fundamental tool in organizations, leveraging internet-scale computing infrastructure. However, despite its growing popularity, there is a lack of awareness regarding the security risks associated with the cloud and effective migration strategies. This course addresses these challenges from a practical perspective. It explores cloud computing architecture, management services, and security considerations. Additionally, it provides insights into cloud migration planning and the essential requirements for transitioning from an untrusted cloud infrastructure to a trusted, internet-scale critical computing environment. Gain practical knowledge and skills to navigate the complexities of cloud security and migration through this comprehensive course.
Course Objectives:
At the end of this training course, participants will learn to:
- Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
- Explain cloud structure, properties, and management services
- Set a cloud adoption strategy
- Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
- Analyze the major risks associated with the different cloud services and deployment models
- Discuss the main principles, mechanisms and best practices for treating cloud risks
- Demonstrate the discussed concepts using practical case studies, business models and industrial tools
Who Should Attend?
IT and infrastructure leaders, decision-makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers
Target Competencies
- Cloud management
- Identity management
- Access management
- Security
Course Outlines:
Cloud Overview
- Cloud definition, misconceptions, and evolution
- Cloud services and deployment types
- Challenges
Cloud Management
- Cloud structure and its properties
- Virtual and application layer management services
- Cloud dynamic nature and its challenges
- Application development and integration within clouds
- Security best practices for automating cloud infrastructure management
- Clarifying the concepts using industrial platforms
Establishing Trust in Clouds
- Defining cloud trustworthiness
- Its properties
- Assessing cloud trustworthiness
- Establishing trust in:
- Private
- Hybrid
- Community
- Public cloud deployment types
- Establishing trust in:
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
- Clarifying the concepts using the open stack management platform
Identity and Access Management
- Authentication
- Authorization
- Access management
- Federated access management
- Insiders vs attackers
- Insiders analysis and management
- Related industrial tools:
- Cloud insider treatments
- Cloud strong authentication
Provenance in Clouds
- Definition and attributes
- Challenges faced
- Security risks mitigation using provenance
- Case studies for using provenance:
- Forensic investigation
- Trustworthy operational management
- Proactive and predictive management
- Bill assurance
- Related industrial tools