Leader dans le secteur des formations en cybersécurité.

C)CSO: Certified Cloud Security Officer

Target group

  • Virtualization Admins 
  • Cloud Security Officers 
  • CIO
  • Virtualization and Cloud Auditors
  • Virtualization and Cloud Compliance Officers

Description

Mile2’s Cloud Security Officer, C)CSO, course will provide you something you will not find in other class! The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge.The C)CSO looks to fill the gap in cloud security education and give you the skills you need to develop strong cloud security. What makes this course powerful is the pairing of knowledge from leading cloud security authorities, with practical lab exercises. You will leave the course with a solid understanding of the cloud stack having been introduced to many technologies used in the cloud. Whether you are implementing private cloud architecture or managing solutions from various vendors, this course is for you.

Program

  • Cloud Computing Terminology
  • Cloud Computing Definition
  • Cloud Computing Characteristics
  • Cloud Computing Benefits
  • Cost Benefit Analysis Reference Model
  • What is Security for the Cloud?
  • Cloud Migration Security Evaluation
  • ENISA Risk Evaluation
  • Cloud Controls Matrix
  • Relevant CCM Controls
  • Application of Governance and Risk Management to the Cloud
  • Importance of the SLA
  • Relevant CCM controls
  • Understanding Unique Risks in the Cloud International Law and Potential Conflicts eDiscovery
  • Contract Considerations
  • Relevant CCM Controls
  • Virtualization Principles
  • Key Components Mapped to Cloud Layer
  • Key Security Concerns
  • Other Technologies Used in the Cloud
  • The Layers
  • Relevant CCM Controls
  • Cloud Data Life Cycle 
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Strategies Understand and Implement Data Discovery and Classification Technologies
  • Design and Implement Relevant Jurisdictional Data Protection for PII
  • Design and Implement Data Rights Management
  • Plan and Implement Data Retention, Deletion and Archival Policies
  • Design and Implement Auditability, Traceability, and Accountability of Data Events
  • Relevant CCM Controls
  • Build Logical Infrastructure for Cloud Environment
  • Manage Logical Infrastructure for Cloud Environment
  • Manage Communications with Relevant Parties
  • Relevant CCM Controls
  • Interoperability
  • Portability
  • Relevant CCM Controls
  • The Physical Environment
  • Support the Planning Process for the Data Center Design
  • Run Physical Infrastructure for Cloud Environment
  • Implement and Build Physical Infrastructure for Cloud Environment
  • Manage Physical Infrastructure for Cloud Environment
  • Relevant CCM Controls
  • Disaster Recovery and Business Continuity Management
  • Examples
  • Relevant CCM Controls 
  • Incident Response
  • Forensics
  • Relevant CCM Controls 
  • Training and Awareness
  • Secure Software Development Life Cycle Process
  • Application of the Secure Software Development Life Cycle
  • Verifying the use of Secure Software
  • Identity and Access Management (IAM) Solutions
  • Additional components for the Cloud Software Assurance and Validation
  • Relevant CCM Controls 
  • Review from other chapters
  • Key Management in today’s cloud services
  • Recommendations
  • Relevant CCM Controls 
  • Introduction to Identity and Access Management Identities and Attributes
  • Architectures for Interfacing to Identity and Attribute Providers
  • The Identity Recommendations
  • Relevant CCM Controls 
  • Compliance and Audit Cloud Issues Assurance Frameworks
  • Auditing
  • Relevant CCM Controls Labs
    • Lab 1: Cloud Migration Evaluation
    • Lab 2: Service Level Agreement (SLA) Compliance
    • Lab 3: Virtualization 101
    • Lab 4: Understanding Network Traffic
    • Lab 5: Hardening your Virtual Machines
    • Lab 6: ESXi Host Hardening
    • Lab 7: Hardening vCenter
    • Lab 8: Basics of Data Security in Azure
    • Lab 9: IaaS
    • Lab 10: Deploying a Cloud
    • Lab 11: Basic Data Center Operations in Azure
    • Lab 12: Interoperability and Portability
    • Lab 13: Business Continuity in Azure
    • Lab 14: PaaS in Azure
    • Lab 15: Encryption in Azure
    • Lab 16: Identity and Access Management in Azure
    • Lab 17: SaaS
    • Lab 18: S-P-I Model Exercise
    • Lab 19: Cloud Business Driver Audit Exercise
    • Lab 20: IaaS Risk Assessment
    • Lab 21: Identity and Access Control Management in the Private Cloud
    • Lab 22: VM Security Audit
    • Lab 23: Encryption/Key Management in SaaS

Goal

Upon completion, Certified Cloud Security Officer students will understand Cloud security from a real-world viewpoint and comprehend the industry security standards. The student will also be prepared to take the C)CSO exam.

Prerequisites

  • (Any of the following Mile2 Courses)
  • 12 months experience with virtualization technology or equivalent knowledge. 
  • General understanding of cloud architectures 
  • Minimum 12 months experience with general security

Tarif

3499 €

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.