Advertisement
opexxx

Cloud Computing Security Knowledge

Jan 17th, 2017
431
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.82 KB | None | 0 0
  1. Tag 1:
  2.  
  3. • Module 1: Introduction and Cloud Architectures
  4. Define cloud computing
  5. Cloud computing stack components
  6. Cloud reference model and security
  7.  
  8. • Module 2: Infrastructure Security for Cloud Computing
  9. Understand the components of cloud infrastructure
  10. Assess the security implications of different deployment models
  11. Advantages and disadvantages of virtual infrastructure
  12. The cloud management plane
  13. Different service models security basics
  14.  
  15. • Exercise 1: Cloud risk assessment- public Cloud
  16. Adopt cloud computing
  17. Migrate existing applications and systems to the cloud
  18.  
  19. • Exercise 2: Create and secure a public cloud instance
  20. Understand public IaaS architectures
  21. Review EC2 components/options
  22. Launch and connect to your first instance
  23. Learn how to secure your instance
  24.  
  25. Tag 2:
  26.  
  27. • Module 3: Managing Cloud Computing Security and Risk
  28. Risk and Governance
  29. Legal and Compliance
  30. Audit
  31. Portability and Interoperability
  32. Incident Response
  33.  
  34. • Exercise 3: Encrypting an EBS Volume
  35. Why encrypt?
  36. Select an encryption method
  37. Create and attach an Amazon EBS volume
  38. Encrypt and format the volume
  39. Understand key management options
  40. Understand the effects of rebooting
  41. Attach the encrypted volume to another instance
  42.  
  43. • Module 4: Data Security for Cloud Computing
  44. Understand different cloud storage models
  45. Define security issues for data in the cloud
  46. Introduce data security lifecycle
  47. Address cloud security and governance
  48. Apply lifecycle to use cases
  49. Discuss data encryption
  50.  
  51. • Exercise 4: Create and Secure a Cloud Application
  52. Understand basic cloud application architectures.
  53. Manage multiple Security Groups for enhanced network security.
  54. Assess the security risks of snapshots.
  55. Utilize IAM on AWS
  56.  
  57. • Module 5: Securing Cloud Applications and Users
  58. Define Application Architecture, Design, and Operations lifecycle
  59. Discuss impact on SDLC
  60. Examine Application Security tools and Vulnerability Management
  61. Discuss role of Compliance in Cloud applications
  62.  
  63. Tag 3:
  64.  
  65. • Exercise 5: Identity and Access Management
  66. Learn how to secure your EC2 “management plane” with AWS IAM
  67. Understand federated identity architectures
  68. Implement federated identity for our application using OpenID
  69. Understand how to apply the same principles in an enterprise
  70. production environment
  71.  
  72. • Module 6: Selecting Cloud Services
  73. Enabling the security strategy
  74. Selecting a cloud provider
  75. Security as a Service (SECaaS)
  76. Summary and Review
  77.  
  78. • Exercise 6: Deploy and Secure a Private Cloud
  79. Understand private cloud architectures
  80. Review the OpenStack components
  81. Create and connect a compute node
  82. Manage OpenStack tenants and IAM
  83. Secure OpenStack management plane
  84. Investigate hypervisor security
  85. Understand security automation
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement