Euro-training Center
 Principles of Cloud Management and Security W1956 QR Code
Share   Like Download Brochure (PDF) Dates and locations

Principles of Cloud Management and Security

Overview:

Introduction:

Group discussions, case studies, and syndicate work are all included in this course's highly participatory format. Additionally, it has hands-on exercises that enable all participants to put their newly acquired information to work by showcasing their expertise in cloud management and security.

Course Objectives:

At the end of this course the participants will be able to: 

  • Recognize the benefits of cloud computing and common misconceptions, as well as its drawbacks.
  • Describe the structure, attributes, and management services of clouds.
  • Make a plan for implementing the cloud
  • Describe the primary criteria to transition from the present cloud's unreliable architecture to a reliable internet-scale cloud computing infrastructure.
  • Examine the main dangers connected to the various cloud services and deployment models.
  • Discuss the key tenets, methods, and recommended procedures for handling cloud risks.
  • Showcase the principles covered utilizing real-world examples, business simulations, and industrial instruments.

Targeted Audience:

Leaders in IT and infrastructure, CxOs, risk analysts, strategic planners, architects, administrators, software developers, and project managers are all needed.

Course Outline:

Unit1:A cloud overview

  • Defined clouds, common misconceptions, and their evolution
  • Services and deployment styles in the cloud
  • Challenges

Unit2: Cloud administration

  • Structure and characteristics of clouds
  • Services for managing the application and virtual layers
  • Challenges posed by the dynamic nature of clouds
  • Integration and development of applications for clouds
  • Automating cloud infrastructure management security recommended practices
  • Using commercial channels to make the principles clear

Unit3:Establishing trust in clouds

  • Defining cloud trustworthiness
  • Its properties

    • Assessing cloud trustworthiness
    • Establishing trust in:
      • Private
      • Hybrid
      • Community
      • Public cloud deployment types
    • Establishing trust in:
      • IaaS (Infrastructure as a Service) 
      • PaaS (Platform as a Service)
      • SaaS (Software as a Service)
    • Clarifying the concepts using openstack management platform

Unit4:  Identification and access control

  • Authentication
  • Authorization
  • Access control
  • managed federated access
  • Attackers versus insiders
  • Analysis and management by insiders
  • Associated industrial equipment
  • insider cloud treatments
  • Strong cloud authentication

Unit5: Cloud provenance

  • Definition and characteristics
  • difficulties encountered
  • Using provenance to reduce security risks
  • Case studies for applying provenance
  • forensic analysis
  • reliable operational management
  • proactive and anticipatory management
  • Bill assurance

Select training course venue