Sie sind auf Seite 1von 3

CCSK - Certificate of Cloud Security Knowledge - Plus

Overview:

Description:

This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands
on it with extensive hands-on labs in a second day of training. Students will learn to apply their
knowledge by performing a series of exercises involving a scenario that brings a fictional
organization securely into the cloud. After completing this training, students will be well prepared
for the CCSK certification exam, sponsored by Cloud Security Alliance. This second day of training
includes additional lecture, although students will spend most of their time assessing, building, and
securing a cloud infrastructure during the exercises.

g
Objectives:

ro
This is a two day class that begins with the CCSK- Basic training, followed by a second day of
additional content and hands-on activities

Target Audience:

This class is geared towards security professionals, but is also useful for anyone looking to expand
P
their knowledge of cloud security.

Training Course Outline:


le
DAY 1

Introduction and Cloud Architecture

Define cloud computing


ob

Cloud computing stack components


Cloud reference model and security

Infrastructure Security for Cloud Computing

Understand the components of cloud infrastructure


Assess security implications of deployment models
N

Advantages and disadvantages of virtual


Cloud management plane
Different service models security basics

Managing cloud computing security and risk

Risk and governance


Legal and compliance
Audit
Portability and interoperability
Incident response

Data security for cloud

Different cloud storage models


Security issues for data in cloud
Address cloud security and governance
NobleProg® Limited 2004 - 2016 All Rights Reserved
Corporates +919818060888 | Individuals +919599409461 | training@nobleprog.in |
www.nobleprog.in
Apply lifecycle to use cases
Discuss data encryption

Securing applications and users

Application architecture design and operations lifecycle


Discuss impact on SDLC
Examine application security tools
Discuss role of compliance in Cloud

Cloud Risk assessment

Adopt cloud computing


Migrate existing apps and systems

g
Create and secure a public cloud

ro
Understand public IaaS architectures
Review EC2 components
Launch and connect to your first instance
Learn how to secure your instance

DAY 2
P
Encrypting an EBS volume

Why encrypt
le
Select a method
Create and attach Amazon EBS
Encrypt and format
Understand key management options
Understand effects of rebooting
ob

Attach encrypted volume to another instance

Identity and access management

Learn how to secure your EC2 with AWS IAM


Understand federated identity architectures
Implement federated identity for application using OpenID
N

How to apply same principles in an enterprise production environment

Deploy and secure a Private Cloud

Understand private cloud architecture


Review OpenStack components
Create and connect a compute node
Manage OpenStack tenants and IAM
Secure OpenStack management plane
Investigate hypervisor security
Understand security automation

Selecting Cloud services

Enabling security strategy


Selecting a cloud provider
Security as a service
NobleProg® Limited 2004 - 2016 All Rights Reserved
Corporates +919818060888 | Individuals +919599409461 | training@nobleprog.in |
www.nobleprog.in
Summary and review

Duration:
14 hours
Course Categories:
Internet Security
Hands on Security

g
ro
P
le
ob
N

NobleProg® Limited 2004 - 2016 All Rights Reserved


Corporates +919818060888 | Individuals +919599409461 | training@nobleprog.in |
www.nobleprog.in

Das könnte Ihnen auch gefallen