This course focuses on and provides comprehensive knowledge of cloud services,
their characteristics, benefits, applications, and service models. It covers planning,
designing, and implementing cloud security controls. It delves into various cloud
standards, countermeasures, and best practices to secure information in the cloud.
The program also emphasizes the business aspects of cloud security, such as cloud
uptime, uptime guarantee, availability, fault tolerance, failover policy, and how
cloud security strengthens the business case for cloud adoption.
-
Course Learning Outcomes
- Understand the fundamentals of cloud computing, cloud services, cloud computing service models, deployment models, and security considerations of cloud computing.
- » Comprehend secure cloud computing environment design
- » Understand cloud computing standards, Outline impacts of cloud outage/failure, and discuss best practices for optimal cloud performance.
- » Discuss best practices of virtualization and cloud implementation.
- » Comprehend various types of attacks on a cloud environment and techniques to overcome attacks.
- » Learn about various configuration management techniques, risk assessment methodologies, penetration testing, and Intrusion detection systems (IDS) for a secured cloud environment.
- » Understand the compliance to established industry standards, acts, and laws including PCI-DSS, HIPAA, Sarbanes-Oxley, and Data Protection Act.
- Discuss the legal issues such as cloud computing contracts, vendor transitioning, auditing cloud data, maintaining privacy and confidentiality, geographic jurisdiction, limitations on vendor liability, and taxation challenges.
- » Comprehend Mobile Cloud Computing (MCC) and discuss best practices for secured mobile cloud access.
- Discuss best practices of virtualization and cloud implementation.
0.0
0 total
5
4
3
2
1