Detailed Course Outline
- Course Introduction
- Module 1 – Introduction to Cloud Computing and Architecture 1. Cloud Computing Terminology 2. Cloud Computing Definition 3. Cloud Computing Characteristics 4. Cloud Computing Benefits 5. Cost Benefit Analysis Reference Model 6. What is Security for the Cloud?
- Module 2 – Cloud Risks 1. Cloud Migration Security Evaluation 2. ENISA Risk Evaluation 3. Cloud Controls Matrix 4. Relevant CCM Controls Module 3 – ERM and Governance 1. Application of Governance and Risk Management to the Cloud 2. Importance of the SLA 3. Relevant CCM controls
- Module 4 – Legal Issues 1. Understanding Unique Risks in the Cloud International Law and Potential Conflicts eDiscovery 2. Contract Considerations 3. Relevant CCM Controls
- Module 5 – Virtualization 1. Virtualization Principles 2. Key Components Mapped to Cloud Layer 3. Key Security Concerns 4. Other Technologies Used in the Cloud 5. The Layers 6. Relevant CCM Controls
- Module 6 – Data Security 1. Cloud Data Life Cycle 2. Design and Implement Cloud Data Storage Architectures 3. Design and Apply Data Security Strategies Understand and Implement Data Discovery and Classification Technologies 4. Design and Implement Relevant Jurisdictional Data Protection for PII 5. Design and Implement Data Rights Management 6. Plan and Implement Data Retention, Deletion and Archival Policies 7. Design and Implement Auditability, Traceability, and Accountability of Data Events 8. Relevant CCM Controls
- Module 7 – Data Center Operations 1. Build Logical Infrastructure for Cloud Environment 2. Manage Logical Infrastructure for Cloud Environment 3. Manage Communications with Relevant Parties 4. Relevant CCM Controls
- Module 8 – Interoperability and Portablility 1. Interoperability 2. Portability 3. Relevant CCM Controls
- Module 9 – Traditional Security 1. The Physical Environment 2. Support the Planning Process for the Data Center Design 3. Run Physical Infrastructure for Cloud Environment 4. Implement and Build Physical Infrastructure for Cloud Environment 5. Manage Physical Infrastructure for Cloud Environment 6. Relevant CCM Controls
- Module 10 – BCM and DR 1. Disaster Recovery and Business Continuity Management 2. Examples 3. Relevant CCM Controls
- Module 11 – Incident Response 1. Incident Response 2. Forensics 3. Relevant CCM Controls
- Module 12 – Application Security 1. Training and Awareness 2. Secure Software Development Life Cycle Process 3. Application of the Secure Software Development Life Cycle 4. Verifying the use of Secure Software 5. Identity and Access Management (IAM) Solutions 6. Additional components for the Cloud Software Assurance and Validation 7. Relevant CCM Controls
- Module 13 – Encryption and Key Management 1. Review from other chapters 2. Key Management in today’s cloud services 3. Recommendations 4. Relevant CCM Controls
- Module 14 – Identity, Entitlement and Access Management 1. Introduction to Identity and Access Management Identities and Attributes 2. Architectures for Interfacing to Identity and Attribute Providers 3. The Identity Recommendations 4. Relevant CCM Controls
- Module 15 – Auditing and Compliance 1. Compliance and Audit Cloud Issues Assurance Frameworks 2. Auditing 3. Relevant CCM Controls Labs Lab 1: Cloud Migration Evaluation
- Lab 2: Service Level Agreement (SLA) Compliance
- Lab 3: Virtualization 101
- Lab 4: Understanding Network Traffic
- Lab 5: Hardening your Virtual Machines
- Lab 6: ESXi Host Hardening
- Lab 7: Hardening vCenter
- Lab 8: Basics of Data Security in Azure
- Lab 9: IaaS Lab 10: Deploying a Cloud
- Lab 11: Basic Data Center Operations in Azure
- Lab 12: Interoperability and Portability
- Lab 13: Business Continuity in Azure
- Lab 14: PaaS in Azure
- Lab 15: Encryption in Azure
- Lab 16: Identity and Access Management in Azure
- Lab 17: SaaS
- Lab 18: S-P-I Model Exercise
- Lab 19: Cloud Business Driver Audit Exercise
- Lab 20: IaaS Risk Assessment
- Lab 21: Identity and Access Control Management in the Private Cloud
- Lab 22: VM Security Audit
- Lab 23: Encryption/Key Management in SaaS"