Nanyang Technological University Center for Continuing Education

Cloud Computing Security and Compliance 101

Available dates

Dec 12—13, 2019
2 days
SGD 835 ≈USD 632
SGD 417 per day
Mar 19—20, 2020
2 days
SGD 835 ≈USD 632
SGD 417 per day


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Nanyang Technological University Center for Continuing Education.

Full disclaimer.

About the course

This course introduces you to the world of cloud computing security. You will learn a consistent way of developing cloud security competency and provides the confidence you need to adopt secure cloud solutions. In this intensive 2-day course, you will learn about the security threats and uncertainties in a cloud environment as well as industry best practices in cloud computing security for the various service models (IaaS, Paas, SaaS).


Upon successful completion of the course, attendees will be able to:

  • Identify the security risks and concerns associated with cloud computing
  • Understand the best practices of dealing with cloud security


Basics of Cloud Computing

  • Fundamental concepts
  • Define cloud computing
  • Cloud computing stack components
  • Cloud reference model and security

Infrastructure Security for Cloud Computing

  • Components of cloud infrastructure
  • Security implications of different deployment models
  • Advantages and disadvantages of virtual infrastructure
  • Different service models security basics

Managing Cloud Computing Security and Risk

  • Risk and Governance
  • Legal and Compliance
  • Audit
  • Portability and Interoperability
  • Incident Response

Data Security for Cloud Computing

  • Understand different cloud storage models
  • Define security issues for data in the cloud
  • Introduce data security lifecycle
  • Address cloud security and governance
  • Apply lifecycle to use cases
  • Discuss data encryption

Securing Cloud Applications and Users

  • Define Application Architecture
  • Design and Operations lifecycle
  • Discuss impact on SDLC
  • Examine Application Security tools and Vulnerability Management
  • Discuss role of Compliance in Cloud applications

Selecting Cloud Services

  • Enabling the security strategy
  • Selecting a cloud provider
  • Security as a Service (SECaaS)
  • Summary and Review

Who should attend

  • Any IT professional who is planning to use cloud computing or who is already working in the cloud environment.
  • Individuals who will like to broaden their knowledge in cloud computing security.

Course reviews