Compare courses
Register
Nanyang Technological University Center for Continuing Education

Cloud Computing Security and Compliance 101

Jun 3—4
2 days
Singapore, Singapore
SGD 835 ≈USD 607
SGD 417 per day

How it works

Description

This course introduces you to the world of cloud computing security. You will learn a consistent way of developing cloud security competency and provides the confidence you need to adopt secure cloud solutions. In this intensive 2-day course, you will learn about the security threats and uncertainties in a cloud environment as well as industry best practices in cloud computing security for the various service models (IaaS, Paas, SaaS).

Objectives

Upon successful completion of the course, attendees will be able to:

  • Identify the security risks and concerns associated with cloud computing
  • Understand the best practices of dealing with cloud security

Outline

Basics of Cloud Computing

  • Fundamental concepts
  • Define cloud computing
  • Cloud computing stack components
  • Cloud reference model and security

Infrastructure Security for Cloud Computing

  • Components of cloud infrastructure
  • Security implications of different deployment models
  • Advantages and disadvantages of virtual infrastructure
  • Different service models security basics

Managing Cloud Computing Security and Risk

  • Risk and Governance
  • Legal and Compliance
  • Audit
  • Portability and Interoperability
  • Incident Response

Data Security for Cloud Computing

  • Understand different cloud storage models
  • Define security issues for data in the cloud
  • Introduce data security lifecycle
  • Address cloud security and governance
  • Apply lifecycle to use cases
  • Discuss data encryption

Securing Cloud Applications and Users

  • Define Application Architecture
  • Design and Operations lifecycle
  • Discuss impact on SDLC
  • Examine Application Security tools and Vulnerability Management
  • Discuss role of Compliance in Cloud applications

Selecting Cloud Services

  • Enabling the security strategy
  • Selecting a cloud provider
  • Security as a Service (SECaaS)
  • Summary and Review

Who should attend

  • Any IT professional who is planning to use cloud computing or who is already working in the cloud environment.
  • Individuals who will like to broaden their knowledge in cloud computing security.

Experts

Mr. Kenneth Ho is a seasoned consultant with extensive knowledge in information risk management, information security and information system audit. He is a certified ISO 27001 Lead Auditor, CRISC, CISSP, CCSK and CISA. He has 20 years of experience in security assessment, design, implementation ...
Show more