This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing an organization’s risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
Why you should attend?
Learn the potential risks and methods for mitigating them when an organization moves to a cloud platform.
What to expect?
This course has an audio component; please make sure you have speakers/headphones available.
All BICSI CONNECT courses require an Internet-capable device and Internet connection.
Java software; Windows 7 or 8; Mac OSx10.6+; Android 4.1 or later; Apple 10S 6.x, 7.x; IE 10 or later; Firefox 21 or later; Chrome 29 or later; Safari 5.1.8 or later; sound card with speakers/headphones for audio (audio not available for all courses); pop-up blockers disabled.
Who should attend?
This course is recommended for ICT and IT professionals who are interested in learning about security and cloud computing.
What will I learn?
After this course, you will be able to:
- Describe the objectives of information security and
how they relate to the cloud
- Describe the challenges associated with cloud
- Describe the three models for public cloud security
- Describe relevant ISO standards for information
- Describe the Security as a Service model
- Describe the security risk areas for cloud computing
- Describe how to assess security offerings for cloud
- Describe the challenges associated with security in a
Software as a Service or SaaS offering
- Describe the best practices for securing a
Software-as-a-Service or SaaS offering
- Describe secure software development practices
- Describe the Jericho Forum Cloud Cube Model for
defining cloud characteristics
- Describe the considerations for infrastructure
security in cloud computing
- Describe the host-level security considerations in
- Describe considerations for security virtualization
hosts in a cloud environment
- Describe application-level security in cloud
- Describe the measures to secure data at rest and data
- Describe how to perform risk assessment in a cloud
- Describe the service-level agreements for cloud
- Describe the measures to secure data and connection in a cloud environment
How long is this course?
Two-hour self-paced course with 90 days from the date of purchase to complete.
Can I earn credit?
Earn 2 Continuing Education Credit (CECs) upon successfully completing this program.
What is the cancellation policy?
All BICSI CONNECT courses are nonrefundable and nontransferable.