Course Outline
Module 1. Cloud Architecture for Government
This module covers the foundational concepts of cloud computing, including definitions, architectures, and the role of virtualization. It explores key topics such as cloud computing service models, delivery models, and essential characteristics. Additionally, it introduces the Shared Responsibilities Model and a framework for addressing cloud security.
Topics Covered:
- Unit 1 - Introduction to Cloud Computing
- Unit 2 - Introduction & Cloud Architecture
- Unit 3 - Cloud Essential Characteristics
- Unit 4 - Cloud Service Models
- Unit 5 - Cloud Deployment Models
- Unit 6 - Shared Responsibilities
Module 2. Infrastructure Security for Cloud Computing for Government
This module delves into the details of securing core infrastructure in cloud computing, including components, networks, management interfaces, and administrator credentials. It covers virtual networking and workload security, as well as the basics of containers and serverless technologies.
Topics Covered:
- Unit 1 - Module Intro
- Unit 2 - Introduction to Infrastructure Security for Cloud Computing
- Unit 3 - Software Defined Networks
- Unit 4 - Cloud Network Security
- Unit 5 - Securing Compute Workloads
- Unit 6 - Management Plane Security
- Unit 7 - Business Continuity and Disaster Recovery (BCDR)
Module 3. Managing Cloud Security and Risk for Government
This module addresses critical considerations for managing security in cloud computing, beginning with risk assessment and governance. It covers legal and compliance issues, such as discovery requirements in the cloud. The module also introduces important CSA risk tools, including the CAIQ, CCM, and STAR registry.
Topics Covered:
- Unit 1 - Module Introduction
- Unit 2 - Governance
- Unit 3 - Managing Cloud Security Risk
- Unit 4 - Legal
- Unit 5 - Legal Issues in Cloud
- Unit 6 - Compliance
- Unit 7 - Audit
- Unit 8 - CSA Tools
Module 4. Data Security for Cloud Computing for Government
This module covers information lifecycle management in the cloud, focusing on applying security controls with an emphasis on public cloud environments. Topics include the Data Security Lifecycle, cloud storage models, data security issues across different delivery models, and managing encryption in and for the cloud, including customer-managed keys (BYOK).
Topics Covered:
- Unit 1 - Module Introduction
- Unit 2 - Cloud Data Storage
- Unit 3 - Securing Data in the Cloud
- Unit 4 - Encryption for IaaS
- Unit 5 - Encryption for PaaS & SaaS
- Unit 6 - Encryption Key Management
- Unit 7 - Other Data Security Options
- Unit 8 - Data Security Lifecycle
Module 5. Application Security and Identity Management for Cloud Computing for Government
This module covers identity management and application security for cloud deployments. It includes topics such as federated identity, different IAM applications, secure development practices, and managing application security in and for the cloud.
Topics Covered:
- Unit 1 - Module Introduction
- Unit 2 - Secure Software Development Life Cycle (SSDLC)
- Unit 3 - Testing & Assessment
- Unit 4 - DevOps
- Unit 5 - Secure Operations
- Unit 6 - Identity & Access Management Definitions
- Unit 7 - IAM Standards
- Unit 8 - IAM in Practice
Module 6. Cloud Security Operations for Government
This module discusses key considerations when evaluating, selecting, and managing cloud computing providers. It also covers the role of Security as a Service (SECaaS) providers and the impact of cloud on incident response.
Topics Covered:
- Unit 1 - Module Introduction
- Unit 2 - Selecting a Cloud Provider
- Unit 3 - SECaaS Fundamentals
- Unit 4 - SECaaS Categories
- Unit 5 - Incident Response
- Unit 6 - Domain 14 Considerations
- Unit 7 - CCSK Exam Preparation
Additional Material for Government
Core Account Security for Government
Students learn what to configure in the first five minutes of opening a new cloud account, including enabling security controls such as MFA, basic monitoring, and IAM.
IAM and Monitoring In-Depth for Government
Attendees expand their work from the initial lab and implement more complex identity management and monitoring. This includes expanding IAM with Attribute-Based Access Controls, implementing security alerting, and understanding how to structure enterprise-scale IAM and monitoring.
Network and Instance Security for Government
Students create a virtual network (VPC) and implement a baseline security configuration. They also learn how to securely select and launch a virtual machine (instance), run a vulnerability assessment in the cloud, and connect to the instance.
Encryption and Storage Security for Government
Students expand their deployment by adding a storage volume encrypted with a customer-managed key. They also learn how to secure snapshots and other data.
Application Security and Federation for Government
Students complete the technical labs by fully building out a two-tier application and implementing federated identity using OpenID.
Risk and Provider Assessment for Government
Students use the CSA Cloud Controls Matrix and STAR registry to evaluate risk and select a cloud provider.
Testimonials (1)
The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.