Course Outline
DAY 1
Introduction and Cloud Architecture
- Define cloud computing for government operations.
- Examine the components of the cloud computing stack.
- Explore the cloud reference model and its security implications for government.
Infrastructure Security for Cloud Computing
- Understand the key components of cloud infrastructure for government use.
- Evaluate the security implications of different deployment models in a government context.
- Discuss the advantages and disadvantages of virtualization in government environments.
- Examine the cloud management plane and its role in ensuring security for government operations.
- Review the basics of security for various service models relevant to government agencies.
Managing Cloud Computing Security and Risk
- Address risk management and governance practices for government cloud initiatives.
- Compliance with legal and regulatory requirements for government data in the cloud.
- Conduct audits of cloud services to ensure compliance with government standards.
- Ensure portability and interoperability of data across different government systems.
- Develop effective incident response strategies for government cloud environments.
Data Security for Cloud
- Explore various cloud storage models suitable for government use.
- Identify security issues specific to government data in the cloud.
- Implement cloud security and governance best practices for government agencies.
- Apply a lifecycle approach to cloud data management in government settings.
- Discuss methods of data encryption tailored for government requirements.
Securing Applications and Users
- Design and manage application architecture for government cloud environments.
- Analyze the impact on the Software Development Life Cycle (SDLC) in a government context.
- Evaluate application security tools appropriate for government use.
- Examine the role of compliance in securing government applications in the cloud.
Cloud Risk Assessment
- Adopt cloud computing solutions that meet government standards.
- Migrate existing government applications and systems to the cloud securely.
Create and Secure a Public Cloud
- Understand public Infrastructure as a Service (IaaS) architectures for government use.
- Review components of Amazon EC2 tailored for government operations.
- Launch and connect your first instance in a government cloud environment.
- Learn best practices for securing instances in government cloud deployments.
DAY 2
Encrypting an EBS Volume
- Understand the importance of encryption for government data.
- Select appropriate encryption methods for government cloud storage.
- Create and attach Amazon Elastic Block Store (EBS) volumes to meet government security requirements.
- Encrypt and format EBS volumes for secure government use.
- Explore key management options suitable for government environments.
- Understand the effects of rebooting on encrypted volumes in a government context.
- Attach encrypted volumes to other instances while maintaining government security standards.
Identity and Access Management
- Secure Amazon EC2 with AWS Identity and Access Management (IAM) for government applications.
- Understand federated identity architectures suitable for government use.
- Implement federated identity for government applications using OpenID.
- Apply these principles to secure enterprise production environments in government agencies.
Deploy and Secure a Private Cloud
- Understand private cloud architecture tailored for government operations.
- Review components of OpenStack that meet government security requirements.
- Create and connect compute nodes in a secure government environment.
- Manage OpenStack tenants and IAM to ensure compliance with government standards.
- Secure the OpenStack management plane for government use.
- Investigate hypervisor security practices relevant to government cloud deployments.
- Explore security automation techniques suitable for government cloud environments.
Selecting Cloud Services
- Develop a security strategy for government cloud initiatives.
- Evaluate and select cloud providers that meet government security standards.
- Understand the concept of security as a service in a government context.
- Summarize key learnings and review best practices for government cloud security.
Testimonials (7)
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
The presenter knowledge, way of speaking, sense of humour.
Rafal Kosz - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Open discussions
Krzysztof Pytko - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Trainer was calm, we had enough time to go through the subjects.
Andrzej Tarczynski - EY
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
I enjoyed the trainer methods to attract our attention.
Antonio Osuna Sanchez - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
Ahmed was always trying to keep attention of us.
Alberto Brezmes - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
The trainer was very nice and available. I appreciated his knowledge, skills and preparation about the subject. Furthermore, he provided us extra content about IoT, very interesting.