

Principles of Cloud Management and Security
Overview:
Introduction:
Group discussions, case studies, and syndicate work are all included in this course's highly participatory format. Additionally, it has hands-on exercises that enable all participants to put their newly acquired information to work by showcasing their expertise in cloud management and security.
Course Objectives:
At the end of this course the participants will be able to:
- Recognize the benefits of cloud computing and common misconceptions, as well as its drawbacks.
- Describe the structure, attributes, and management services of clouds.
- Make a plan for implementing the cloud
- Describe the primary criteria to transition from the present cloud's unreliable architecture to a reliable internet-scale cloud computing infrastructure.
- Examine the main dangers connected to the various cloud services and deployment models.
- Discuss the key tenets, methods, and recommended procedures for handling cloud risks.
- Showcase the principles covered utilizing real-world examples, business simulations, and industrial instruments.
Targeted Audience:
Leaders in IT and infrastructure, CxOs, risk analysts, strategic planners, architects, administrators, software developers, and project managers are all needed.
Course Outline:
Unit1:A cloud overview
- Defined clouds, common misconceptions, and their evolution
- Services and deployment styles in the cloud
- Challenges
Unit2: Cloud administration
- Structure and characteristics of clouds
- Services for managing the application and virtual layers
- Challenges posed by the dynamic nature of clouds
- Integration and development of applications for clouds
- Automating cloud infrastructure management security recommended practices
- Using commercial channels to make the principles clear
Unit3:Establishing trust in clouds
- Defining cloud trustworthiness
-
Its properties
- Assessing cloud trustworthiness
- Establishing trust in:
- Private
- Hybrid
- Community
- Public cloud deployment types
- Establishing trust in:
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
- Clarifying the concepts using openstack management platform
Unit4: Identification and access control
- Authentication
- Authorization
- Access control
- managed federated access
- Attackers versus insiders
- Analysis and management by insiders
- Associated industrial equipment
- insider cloud treatments
- Strong cloud authentication
Unit5: Cloud provenance
- Definition and characteristics
- difficulties encountered
- Using provenance to reduce security risks
- Case studies for applying provenance
- forensic analysis
- reliable operational management
- proactive and anticipatory management
- Bill assurance