Certified Cloud Security Officer (CCSO) - e-learning
Startdata en plaatsen
Beschrijving
Vijfhart, dat klopt voor jou!
- Oefenomgeving tot 3 maanden na afronding beschikbaar
- Flexgarantie: wissel eenvoudig van virtueel naar fysiek, of andersom
- Kennisgarantie: volg jouw cursus gratis nog een keer, fysiek of virtueel
- Ontvang een gratis proefexamen bij meerdere opleidingen
Lesmethode :
etraining
Algemeen :
We offer you the following benefits for this Mile2 course:
#This e-learning includes an exam.
#The material is accessible 365 days after activation.
#The exam voucher is valid 365 days after activation.
The Cloud is being widely adopted today for a diverse set of reasons! However, many are finding that security in the cloud is a huge challenge! Either because of implementation or Governance. Yes, Governance of security related to your cloud vendor is a huge challenge. However, many global standards have been developed that provide a great baseline for cloud security along with governance.
This course will provide for you what you do not find in other class…
Veelgestelde vragen
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Vijfhart, dat klopt voor jou!
- Oefenomgeving tot 3 maanden na afronding beschikbaar
- Flexgarantie: wissel eenvoudig van virtueel naar fysiek, of andersom
- Kennisgarantie: volg jouw cursus gratis nog een keer, fysiek of virtueel
- Ontvang een gratis proefexamen bij meerdere opleidingen
Lesmethode :
etraining
Algemeen :
We offer you the following benefits for this Mile2
course:
#This e-learning includes an exam.
#The material is accessible 365 days after activation.
#The exam voucher is valid 365 days after activation.
The Cloud is being widely adopted today for a diverse set of
reasons! However, many are finding that security in the cloud is a
huge challenge! Either because of implementation or Governance.
Yes, Governance of security related to your cloud vendor is a huge
challenge. However, many global standards have been developed that
provide a great baseline for cloud security along with
governance.
This course will provide for you what you do not find in other
classes! The combination of knowledge combined into one source from
the leading global standards. We also provide practical skills
regarding implementing cloud security, auditing and compliance.
This is all managed by a unique delivery of cloud security along
with the hands-on labs needed to truly understand what is happening
to your data at all the layers of the cloud stack. This is a
relevant course which introduces many technologies used in the
cloud from implementing a private cloud architecture to using a new
key management solution from various vendors.
This e-learning is in English.
Doel :
# To fully understand Cloud Security from a real-world view
point
# To receive the hands-on experience needed to implement Cloud
Security with practical implementations
# To comprehend the industry security standards for both exam
knowledge and implementation
# To have a general working knowledge on what to audit in a cloud
architecture.
# To know hands-on methods of auditing a cloud environment from
best practices view point.
# To understand how compliance is viewed and dealt with in the
cloud.
# To gain the knowledge needed to pass the exam
Doelgroep :
Virtualization Administrators, Cloud Administrators, CIO,
Virtualization and Cloud Auditors, Virtualization and Cloud
Compliance Officers, anyone that needs a general understanding of
security in the Cloud, those seeking the CCSP
Certification.
Voorkennis :
Recommended minimum one-year experience with virtualization
technology or equivalent knowledge. General understanding of cloud
architectures. Minimum one-year experience with general
security.
Onderwerpen :
- Module 1 - Introduction to Cloud Computing and Architecture
- Cloud Computing Terminology
- Cloud Computing Definition
- Cloud Computing Characteristics
- Cloud Computing Benefits
- Cost Benefit Analysis
- Reference Model
- What is Security for the Cloud?
- Module 2 - Cloud Risks
- Cloud Migration Security Evaluation
- ENISA Risk Evaluation
- Cloud Controls Matrix
- Relevant CCM Controls
- Module 3 - ERM and Governance
- Application of Governance and Risk Management
to the Cloud
- Importance of the SLA
- Relevant CCM controls
- Module 4 - Legal Issues
- Understanding Unique Risks in the Cloud
- International Law and Potential Conflicts
- eDiscovery
- Contract Considerations
- Relevant CCM Controls
- Module 5 - Virtualization
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
- Module 6 - Data Security
- Cloud Data Life Cycle
- Design and Implement Cloud Data Storage
- Architectures
- Design and Apply Data Security Strategies
- Understand and Implement Data Discovery and
Classification Technologies
- Design and Implement Relevant Jurisdictional
Data Protection for PII
- Design and Implement Data Rights Management
- Plan and Implement Data Retention, Deletion and
Archival Policies
- Design and ImplementAuditability, Traceability,
and Accountability of Data Events
- Relevant CCM Controls
- Module 7 - Data Center Operations
- Build Logical Infrastructure for Cloud
Environment
- Manage Logical Infrastructure for Cloud
Environment
- Manage Communications with Relevant Parties
- Relevant CCM Controls
- Module 8 - Interoperability and Portability
- Interoperability
- Portability
- Relevant CCM Controls
- Module 9 - Traditional Security
- The Physical Environment
- Support the Planning Process for the Data
Center Design
- Implement and Build Physical Infrastructure for
Cloud Environment
- Run Physical Infrastructure for Cloud
Environment
- Manage Physical Infrastructure for Cloud
Environment
- Relevant CCM Controls
- Module 10 - BCM and DR
- Disaster Recovery and Business Continuity
Management
- Examples
- Relevant CCM Controls
- Module 11 - Incident Response
- Incident Response
- Forensics
- Relevant CCM Controls
- Module 12 - Application Security
- Training and Awareness Secure Software
Development Life Cycle Process
- Application of the Secure Software Development
Life Cycle
- Verifying the use of Secure Software
- Identity and Access Management (IAM)
Solutions
- Additional components for the Cloud
- Software Assurance and Validation
- Relevant CCM Controls
- Module 13 - Encryption and Key Management
- Review from other chapters
- Key Management in today's cloud services
- Recommendations
- Relevant CCM Controls
- Module 14 - Identity, Entitlement and Access Management
- Introduction to Identity and Access
Management
- Identities and Attributes
- Architectures for Interfacing to Identity and
Attribute Providers
- The Identity
- Recommendations
- Relevant CCM Controls
- Module 15 - Auditing and Compliance
- Compliance and Audit Cloud Issues
- Assurance Frameworks
- Auditing
- CCM Relevant Controls
Blijf op de hoogte van nieuwe ervaringen
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.