Compare courses
Nanyang Technological University Center for Continuing Education

Cloud Computing Security and Compliance 101

This course has no confirmed dates in the future. Subscribe to be notified when it is offered.

Relevant courses

Course format
Starting after
Ending before


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Nanyang Technological University Center for Continuing Education.

Full disclaimer.


This course introduces you to the world of cloud computing security. You will learn a consistent way of developing cloud security competency and provides the confidence you need to adopt secure cloud solutions. In this intensive 2-day course, you will learn about the security threats and uncertainties in a cloud environment as well as industry best practices in cloud computing security for the various service models (IaaS, Paas, SaaS).


Upon successful completion of the course, attendees will be able to:

  • Identify the security risks and concerns associated with cloud computing
  • Understand the best practices of dealing with cloud security


Basics of Cloud Computing

  • Fundamental concepts
  • Define cloud computing
  • Cloud computing stack components
  • Cloud reference model and security

Infrastructure Security for Cloud Computing

  • Components of cloud infrastructure
  • Security implications of different deployment models
  • Advantages and disadvantages of virtual infrastructure
  • Different service models security basics

Managing Cloud Computing Security and Risk

  • Risk and Governance
  • Legal and Compliance
  • Audit
  • Portability and Interoperability
  • Incident Response

Data Security for Cloud Computing

  • Understand different cloud storage models
  • Define security issues for data in the cloud
  • Introduce data security lifecycle
  • Address cloud security and governance
  • Apply lifecycle to use cases
  • Discuss data encryption

Securing Cloud Applications and Users

  • Define Application Architecture
  • Design and Operations lifecycle
  • Discuss impact on SDLC
  • Examine Application Security tools and Vulnerability Management
  • Discuss role of Compliance in Cloud applications

Selecting Cloud Services

  • Enabling the security strategy
  • Selecting a cloud provider
  • Security as a Service (SECaaS)
  • Summary and Review

Who should attend

  • Any IT professional who is planning to use cloud computing or who is already working in the cloud environment.
  • Individuals who will like to broaden their knowledge in cloud computing security.


Mr. Kenneth Ho is a seasoned consultant with extensive knowledge in information risk management, information security and information system audit. He is a certified ISO 27001 Lead Auditor, CRISC, CISSP, CCSK and CISA. He has 20 years of experience in security assessment, design, implementation ...
Show more