Passionately developing careers since 2000.

logo

عربي

عربي

course

Cloud Security Architecture

Why Attend

Cloud computing is a new concept using old technologies. It has quickly become a vital tool in organizations across all industries as an Internet-scale computing infrastructure. Nevertheless, despite Cloud computing’s increasing relevance and popularity, there is a lack of understanding of the security risks associated with Clouds and optimal approaches for migration into Clouds. This course covers these from a practical angle; specifically, it covers Cloud computing architecture, management services, and security challenges. It also discusses Cloud migration planning and the main requirements to move current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical computing infrastructure.

Overview

Course Outline

Schedule & Fees

Methodology

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that allow all participants to use the knowledge they gained to demonstrate their skills in cloud management and security.

Course Objectives

By the end of the course, participants will be able to:

Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses

Explain cloud structure, properties and management services

Set a cloud adoption strategy

Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure

Analyze the major risks associated with the different cloud services and deployment models

Discuss the main principles, mechanisms and best practices for treating cloud risks

Demonstrate the discussed concepts using practical case studies, business models and industrial tools

Target Audience

IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers

Target Competencies

Cloud management

Identity management

Access management

Security risks management

HAVE A QUESTION?

Larimar will help you find what you are looking for