Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tag 1:
- • Module 1: Introduction and Cloud Architectures
- Define cloud computing
- Cloud computing stack components
- Cloud reference model and security
- • Module 2: Infrastructure Security for Cloud Computing
- Understand the components of cloud infrastructure
- Assess the security implications of different deployment models
- Advantages and disadvantages of virtual infrastructure
- The cloud management plane
- Different service models security basics
- • Exercise 1: Cloud risk assessment- public Cloud
- Adopt cloud computing
- Migrate existing applications and systems to the cloud
- • Exercise 2: Create and secure a public cloud instance
- Understand public IaaS architectures
- Review EC2 components/options
- Launch and connect to your first instance
- Learn how to secure your instance
- Tag 2:
- • Module 3: Managing Cloud Computing Security and Risk
- Risk and Governance
- Legal and Compliance
- Audit
- Portability and Interoperability
- Incident Response
- • Exercise 3: Encrypting an EBS Volume
- Why encrypt?
- Select an encryption method
- Create and attach an Amazon EBS volume
- Encrypt and format the volume
- Understand key management options
- Understand the effects of rebooting
- Attach the encrypted volume to another instance
- • Module 4: Data Security for Cloud Computing
- Understand different cloud storage models
- Define security issues for data in the cloud
- Introduce data security lifecycle
- Address cloud security and governance
- Apply lifecycle to use cases
- Discuss data encryption
- • Exercise 4: Create and Secure a Cloud Application
- Understand basic cloud application architectures.
- Manage multiple Security Groups for enhanced network security.
- Assess the security risks of snapshots.
- Utilize IAM on AWS
- • Module 5: Securing Cloud Applications and Users
- Define Application Architecture, Design, and Operations lifecycle
- Discuss impact on SDLC
- Examine Application Security tools and Vulnerability Management
- Discuss role of Compliance in Cloud applications
- Tag 3:
- • Exercise 5: Identity and Access Management
- Learn how to secure your EC2 “management plane” with AWS IAM
- Understand federated identity architectures
- Implement federated identity for our application using OpenID
- Understand how to apply the same principles in an enterprise
- production environment
- • Module 6: Selecting Cloud Services
- Enabling the security strategy
- Selecting a cloud provider
- Security as a Service (SECaaS)
- Summary and Review
- • Exercise 6: Deploy and Secure a Private Cloud
- Understand private cloud architectures
- Review the OpenStack components
- Create and connect a compute node
- Manage OpenStack tenants and IAM
- Secure OpenStack management plane
- Investigate hypervisor security
- Understand security automation
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement