Passionately developing careers since 2000.
Overview
Course Outline
Schedule & Fees
Methodology
This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that allow all participants to use the knowledge they gained to demonstrate their skills in cloud management and security.
Course Objectives
By the end of the course, participants will be able to:
Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
Explain cloud structure, properties and management services
Set a cloud adoption strategy
Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
Analyze the major risks associated with the different cloud services and deployment models
Discuss the main principles, mechanisms and best practices for treating cloud risks
Demonstrate the discussed concepts using practical case studies, business models and industrial tools
Target Audience
IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers
Target Competencies
Cloud management
Identity management
Access management
Security risks management
Larimar will help you find what you are looking for