Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Cloud Security Officer C)CSO On-Demand
Description
Certified Cloud Security Officer C)CSO On-Demand Introduction
Welcome to our Certified Cloud Security Officer On-Demand C)CSO On-Demand course, meticulously designed for those eager to master cloud security’s intricacies. This course is an indispensable resource for professionals across various roles, including Virtualization Administrators, Cloud Administrators, CIOs, Auditors, and Compliance Officers.
It is tailored to elevate your understanding of cloud security to new heights, irrespective of your current expertise level. Our C)CSO On-Demand course bridges the gap between theoretical knowledge and real-world application, ensuring a well-rounded learning experience.
Dive into a curriculum enriched with cutting-edge content, encompassing the latest trends and best practices in cloud security. You will engage in interactive lab exercises that simulate real-life scenarios, enhancing your problem-solving skills in cloud security contexts. Assessments throughout the course are designed to reinforce learning and track your progress, providing a clear path to becoming a Certified Cloud Security Officer.
This self-paced format is perfect for professionals who need to balance learning with their demanding schedules, offering the flexibility to learn anytime, anywhere. Join us in this comprehensive exploration of cloud security and take a significant step towards professional excellence in the ever-evolving cloud ecosystem.
Certified Cloud Security Officer On-Demand Course Objectives
- Understand Cloud Security: Gain real-world insights into cloud security and become familiar with industry security standards.
- Cloud Risks: Evaluate cloud migration security, identify risk factors, and explore relevant controls.
- ERM and Governance: Apply governance and risk management principles to the cloud, emphasizing the importance of SLAs (Service Level Agreements), and working with relevant controls.
- Legal Issues: Delve into unique risks in the cloud, international law considerations, contract considerations, and eDiscovery.
- Virtualization: Master virtualization principles, understand key components mapped to cloud layers, and address key security concerns.
- Data Security: Explore the cloud data lifecycle, design secure data storage architectures, and implement data security strategies.
Prerequisites
- Recommended minimum one-year experience with virtualization technology or equivalent knowledge.
- General understanding of cloud architectures.
- Minimum one-year experience with general security.
Audience
- Virtualization Administrators
- Cloud Administrators, CIO
- Virtualization and Cloud Auditors
- Virtualization and Cloud Compliance Officers
- Anyone that needs a general understanding of security in the Cloud
Certified Cloud Security Officer C)CSO On-Demand Outline
Introduction to Cloud Computing and Architecture
- Cloud Computing Terminology
- Cloud Computing Definition
- Cloud Computing Characteristics
- Cloud Computing Benefits
- Cost Benefit Analysis Reference Model
- What is Security for the Cloud?
Cloud Risks
- Cloud Migration Security Evaluation
- ENISA Risk Evaluation
- Cloud Controls Matrix
- Relevant CCM Controls
ERM and Governance
- Application of Governance and Risk Management to the Cloud
- Importance of the SLA
- Relevant CCM controls
Legal Issues
- Understanding Unique Risks in the Cloud International Law and Potential Conflicts eDiscovery
- Contract Considerations
- Relevant CCM Controls
Virtualization
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
Data Security
- Cloud Data Life Cycle
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Strategies
- Understand and Implement Data Discovery and Classification Technologies
- Design and Implement Relevant Jurisdictional Data Protection for PII
- Design and Implement Data Rights Management
- Plan and Implement Data Retention, Deletion and Archival Policies
- Design and Implement Auditability, Traceability, and Accountability of Data Events
- Relevant CCM Controls
Data Center Operations
- Build Logical Infrastructure for Cloud Environment
- Manage Logical Infrastructure for Cloud Environment
- Manage Communications with Relevant Parties
- Relevant CCM Controls
Interoperability and Portablility
- Interoperability
- Portability
- Relevant CCM Controls
Traditional Security
- The Physical Environment
- Support the Planning Process for the Data Center Design
- Run Physical Infrastructure for Cloud Environment
- Implement and Build Physical Infrastructure for Cloud Environment
- Manage Physical Infrastructure for Cloud Environment
- Relevant CCM Controls
BCM and DR
- Disaster Recovery and Business Continuity Management
- Examples
- Relevant CCM Controls
Incident Response
- Incident Response
- Forensics
- Relevant CCM Controls
Application Security
- Training and Awareness
- Secure Software Development Life Cycle Process
- Application of the Secure Software Development Life Cycle
- Verifying the use of Secure Software
- Identity and Access Management (IAM) Solutions
- Additional components for the Cloud Software Assurance and Validation
- Relevant CCM Controls
Encryption and Key Management
- Review from other chapters
- Key Management in today’s cloud services
- Recommendations
- Relevant CCM Controls
Identity, Entitlement and Access Management
- Introduction to Identity and Access Management Identities and Attributes
- Architectures for Interfacing to Identity and Attribute Providers
- The Identity Recommendations
- Relevant CCM Controls
Auditing and Compliance
- Compliance and Audit Cloud Issues
- Assurance Frameworks
- Auditing
- Relevant CCM Controls
Labs
- Lab 1: Cloud Migration Evaluation
- Lab 2: Service Level Agreement (SLA) Compliance
- Lab 3: Virtualization 101
- Lab 4: Understanding Network Traffic
- Lab 5: Hardening your Virtual Machines
- Lab 6: ESXi Host Hardening
- Lab 7: Hardening vCenter
- Lab 8: Basics of Data Security in Azure
- Lab 9: IaaS
- Lab 10: Deploying a Cloud
- Lab 11: Basic Data Center Operations in Azure
- Lab 12: Interoperability and Portability
- Lab 13: Business Continuity in Azure
- Lab 14: PaaS in Azure
- Lab 15: Encryption in Azure
- Lab 16: Identity and Access Management in Azure
- Lab 17: SaaS
- Lab 18: S-P-I Model Exercise
- Lab 19: Cloud Business Driver Audit Exercise
- Lab 20: IaaS Risk Assessment
- Lab 21: Identity and Access Control Management in the Private Cloud
- Lab 22: VM Security Audit
- Lab 23: Encryption/Key Management in SaaS
Self-Study Package (1-Year Access):
- Individual Course Access
- Online Course Video
- E-Book
- E-Lab Guide
- Exam Prep
- Exam
- Cyber Range Access
Join us in mastering cloud security with the C)CSO On-Demand course, offering flexibility and comprehensive insights into securing cloud environments.
$1095.00
|
|