Categories
Search
Time Zone

Cloud Security Specialist

Options







Time Zone




USD $655 $327.50 eLearning Kit only

As Cloud solutions become more ubiquitous so do the risks associated with using them. Cyber Security is an ever present danger to both private and public organisations. As specialists, it is our job to ensure that the Cloud solutions we design and implement are secure and reliable.

In this course you'll gain detailed knowledge of common threats associated with cloud platforms, cloud services, and associated IT resources based on typical cloud technologies, including virtualization environments. You'll learn how to establish security controls for cloud architectures and infrastructure resources via the mastery of security patterns, practices, and industry technologies. 

Get a sample of the contents of this course with this short video lesson that shows Who does what in a Cloud? This second video lesson is an introduction to Understanding Cloud Computing. Both of these topics are part of Module 1 of the course. You can also take the on-line exam to get a Digital Badge to show your expertise in this field.

Course contents: 5 Modules

  • Module 1: Fundamental Cloud Computing
  • Module 2: Cloud Technology Concepts
  • Module 7: Fundamental Cloud Security
  • Module 8: Advanced Cloud Security
  • Module 9: Cloud Security Lab

 

The subscription duration for all kits in the eLearning bundle is 1 year from the date of purchase.

Intended for

Security Professionals, IT Professionals, Technical Architects, Enterprise Architects, Solution Architects, Infrastructure Architects, anyone that wants to understand more about the cloud.


 Learning Outcomes

A comprehensive understanding of cloud, security concerns and the associated controls. Some of the topics covered include:

  • Cloud Security Basics and Common Cloud Security Mechanisms
  • Cloud Security Threats and Threat Categorization Methodology
  • Identification and Treatment of Common Threats
  • Cloud Network Security Patterns and Supporting Mechanisms
  • Securing Network Connections and Cloud Authentication Gateways
  • Collaborative Monitoring and Logging, Independent Cloud Auditing
  • Cloud Identity and Access Management Patterns and Supporting Mechanisms
  • Federating and Enabling Secure Interoperability among Cloud Consumers
  • Trust Assurance Patterns and Supporting Mechanisms
  • Trust Attestation and Establishing Trustworthiness
  • Cloud Service Security Patterns and Supporting Mechanisms
  • Virtual Machine Platform Protection Patterns
  • Considerations for Setting Up Secure Ephemeral Perimeters
  • Trusted Cloud Resource Pools and Cloud Resource Access Control
  • Permanent Data Access Loss Protection and Cloud Data Breach Protection
  • Isolated Trust Boundaries
  • The Attack Lifecycle and the Security Lifecycle
  • Proactive Mitigation vs. Incidence Response
  • Threats, Vulnerabilities, Impacts from Exploitation
  • Threat Modeling, Threats and Mitigations

Options

The course is available as eLearning kits for self-study or as a Virtual Workshop with or without exam vouchers. You'll need to purchase the exam vouchers if you are planning to attain the relevant certification. If choosing a workshop, please also choose the relevant dates and timezones.

The Details Tab provides additional information about the course content. You can also download a PDF copy of the curriculum here.


Exams & Certification

  • The exams required for certification can be taken at any Pearson VUE testing center in the world or online via Pearson VUE Online Proctoring.
  • Please ensure you purchase the correct exam voucher as they are not exchangable.

 

 Note: All quoted pricing is excluding GST. For customers in Australia GST will be added during the check-out process.

Module 1 Fundamental Cloud Computing
Concepts, terminology, technologies, benefits, challenges, SLAs and business cost metrics associated with cloud computing are covered, along with SaaS, IaaS, PaaS delivery models, common cloud deployment models, and cloud characteristics.

The following topics are covered:

• Fundamental Cloud Computing Terminology and Concepts
• Basics of Virtualization
• Specific Characteristics that Define a Cloud
• Understanding Elasticity, Resiliency, On-Demand and Measured Usage
• Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services
• Cloud Resource Administrator and Cloud Service Owner Roles
• Cloud Service and Cloud Service Consumer Roles
• Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) Cloud Delivery Models
• Combining Cloud Delivery Models
• Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models
• Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs
• Service Level Agreements (SLAs) for Cloud-based IT Resources
• Formulas for Calculating and Rating SLA Quality of Service Characteristics

 

Module 2 Cloud Technology Concepts
This course covers a range of topics related to cloud computing mechanisms, cloud security threats and controls, and essential cloud technologies. Also addressed are testing, cloud storage, industry standards, and emerging technologies and trends.

The following primary topics are covered:

• Cloud Computing Mechanisms that Establish Architectural Building Blocks
• Virtual Servers, Ready-Made Environments, Failover Systems, and Pay-for-Use Monitors
• Cloud Balancing and Cloud Bursting Architectures
• Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions
• Cloud Security Mechanisms Used to Counter Threats and Attacks
• Understanding Cloud-Based Security Groups and Hardened Virtual Server Images
• Cloud Service Implementation Mediums (including Web Services and REST Services)
• Cloud Storage Benefits and Challenges
• Cloud Storage Services, Technologies and Approaches
• Non-Relational (NoSQL) Storage Compared to Relational Storage
• Cloud Service Testing Considerations and Testing Types

 

Module 7 Fundamental Cloud Security
This course dives into the implementation technologies behind the cloud security mechanisms first introduced in Module 2, and further explores how these mechanisms and associated security technologies can be configured and combined to establish a cloud security architecture.

The following primary topics are covered:

• Cloud Security Basics and Common Cloud Security Mechanisms
• Cloud Security Threats and Threat Categorization Methodology
• Identification and Treatment of Common Threats
• Cloud Network Security Patterns and Supporting Mechanisms
• Securing Network Connections and Cloud Authentication Gateways
• Collaborative Monitoring and Logging, Independent Cloud Auditing
• Cloud Identity and Access Management Patterns and Supporting Mechanisms
• Federating and Enabling Secure Interoperability among Cloud Consumers
• Trust Assurance Patterns and Supporting Mechanisms
• Trust Attestation and Establishing Trustworthiness

 

Module 8 Advanced Cloud Security
Complex security topics are addressed by this course, which introduces a set of security design patterns that address the application of cloud security mechanisms and technologies in order to establish sophisticated, custom security controls for preventative and reactionary responses to common threats and attacks.

The following primary topics are covered:

• Cloud Service Security Patterns and Supporting Mechanisms
• Virtual Machine Platform Protection Patterns
• Considerations for Setting Up Secure Ephemeral Perimeters
• Trusted Cloud Resource Pools and Cloud Resource Access Control
• Permanent Data Access Loss Protection and Cloud Data Breach Protection
• Isolated Trust Boundaries
• The Attack Lifecycle and the Security Lifecycle
• Proactive Mitigation vs. Incidence Response
• Threats, Vulnerabilities, Impacts from Exploitation
• Threat Modeling, Threats and Mitigations

Module 9 Cloud Security Lab
A hands-on lab during which participants apply the patterns, concepts, techniques, and mechanisms covered in previous courses, in order to complete a series of exercises that present real-world security problems.

As a hands-on lab, this course provides a set of detailed exercises, that require participants to solve a number of inter-related problems, with the ultimate goal of evaluating, designing and correcting technology architectures to fulfil specific sets of solution and business automation requirements.

 


 

Note: All quoted pricing is excluding GST. For customers in Australia GST will be added during the check-out process.



← Go Back
© 2021 Silver Platypus, All Rights Reserved. Web Design Melbourne MeKoo Solutions. Sunday, 17 October 2021
Scroll To Top