TRAINING PROGRAMME



Cloud Security Foundation

This training exposes participants with the relevant skills and knowledge in Cloud Computing Security (also known as Cloud Security) supported with the fundamental of understanding the cloud computing technology and its deployment ecosystem. Participants will have the understanding on cloud computing services (IaaS, PaaS, and SaaS) and the understanding of cloud deployment models consist of Public Cloud, Private Cloud and Hybrid Cloud.

Participants will be able to understand the security aspect, requirements, and ecosystems of cloud computing operations from the perspectives of cloud service provider and cloud service subscribers. Understanding the cloud architecture and cloud operations through the views of cloud computing security are crucial in ensuring assurance of secure cloud ecosystem in the cloud operations.

 

  1. To understand the cloud computing evolution, characteristic and benefit of using the cloud computing technology. This topic also covers the introduction to the cloud service models and cloud deployment models.
  2. To understand the the security objective for cloud computing, the security threats in the cloud and the security model for cloud computing. This topic also covers the typical security controls, issues and security features as consideration in cloud computing implementation.
  3. To understand the cloud security assessment concepts from the aspects of testing methodology and audit methodology applicable for cloud service provider and cloud service subscriber.

Individual may have background as IT engineers, cloud solution developers, IT security officers, security testers and anyone is concerned about cloud computing security and its ecosystem.

Module 1: Cloud Computing Fundamental
Topic 1.1: Introduction to Cloud Computing
Summary: This topic will discuss on the introduction of cloud computing evolution, characteristic and benefit of using the cloud computing technology. This topic also covers the introduction to the cloud service models and cloud deployment models. The following is the sub-topics will be covered in the training module, as follows.

  1. Introduction to Cloud Computing Technology:
    • What is Cloud Computing?
    • Characteristics of Cloud Computing.
    • Cloud Service Models.
    • Cloud Deployment Models.
  2. Exercise 1 – Quizzes.

Topic 1.2: Virtualization in Cloud
Summary: This topic will be discussing on concept of virtualization, hypervisor, virtual recourses and the component inside it that used by cloud computing.This topic will also explain on the benefit of server, desktop and application virtualization and how it can be related to cloud computing. Method of managing virtual machines, networking and storage will also be covered in this topic. Learning on the migration method from a physical server to virtualization environment. The following is the sub-topics will be covered in the training module, as follows.
  1. Introduction to Virtualization for Cloud Computing:
    • What is this virtualization?
    • Desktop Virtualization (VDI).
    • Application Virtualization.
    • Migrating physical server to virtual.
  2. Exercise 2 – Quizzes.
Topic 1.3: Cloud Networking concept and Implementation
Summary: This topic will be discussing on cloud networking concept and implementation. It will cover the concepts of cloud network configuration, cloud network optimization, basic troubleshooting network connectivity issues in the cloud. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Networking Concepts:
    • Cloud Network configuration
    • Cloud Network optimization
    • Troubleshooting basic network connectivity issues on the cloud.
  2. Exercise 3 – Quizzes.
Topic 1.4: Cloud Management Concept
Summary: This topic will discuss on why managing your cloud deployment is important, the CSS and CSP responsibilities and the list of remote access tools for managing your cloud. The following is the sub-topics will be covered in the training module, as follows.
  1. Introduction to Cloud Management:
    • Managing the cloud deployment.
    • Understand the CSS and CSP responsibilities.
    • Remote access tools for managing the cloud.
  2. Exercise 4 – Quizzes.
Topic 1.5: Challenges in Cloud Security
Summary: This topic will be discussing on the challenges in the cloud services against traditional IT, case study on the challenges of cloud implementation and top security challenges on cloud ecosystem. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Challenges:
    • Challenges in Cloud Services against Traditional IT.
    • Case Study: Challenges of Cloud Implementation.
    • Top Challenges on Cloud Implementation.
  2. Exercise 5 – Quizzes.
Module 2: Cloud Computing Security & Assessment
Topic 2.1: Introduction to Cloud Security
Summary: This topic will be discussing on the security objective for cloud computing, the security threats in the cloud and the security model for cloud computing. This topic also covers the typical security controls, issues and security features as consideration in cloud computing implementation. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Introduction:
    • Security objective for cloud computing.
    • Challenges in Cloud Security
    • Security Threats in Cloud Computing.
    • Security Model for Cloud.
  2. Exercise 6 – Quizzes.
Topic 2.2: Understanding Virtualization Security
Summary: This topic will be discussing on the virtualization security and the typical security problems with virtualization. The content will cover the virtual machine discovery and inventory, configuration management, change management and network segmentation. The following is the sub-topics will be covered in the training module, as follows.
  1. Virtualization Security:
    • Security Virtualization
    • Virtual machine discovery and inventory
    • Configuration management
    • Change management
    • Network segmentation
  2. Exercise 7 – Quizzes.
Topic 2.3: Business continuity in the Cloud
Summary: This topic will be discussing is on the business continuity aspects in the cloud. It will cover on phases of disaster recovery and the disaster recovery methods in the cloud such as failover and failback, replication, hot site etc. The following is the sub-topics will be covered in the training module, as follows.
  1. Business continuity in the cloud:
    • Disaster Recovery.
    • Disaster Recovery Methods in Cloud.
  2. Exercise 8 – Quizzes.
Topic 2.4: Cloud Network Security & Encryption
Summary: This topic will be discussing on the typical cloud encryption technology and methods. Details will cover on the public key infrastructure (PKI) components, IPSec, SSL, TLS and Ciphers.
  1. Cloud Network Security & Encryption: Cloud encryption technology and methods.
  2. Exercise 9 – Quizzes.
Topic 2.5: Cloud Application Security
Summary: This topic will be discussing on the cloud application security. It will cover the understanding of user access control, Operating System hardening via checklist, instance and image security, IAM roles and the data security in the cloud. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Application Security Concept:
    • Understanding user access control.
    • Operating System hardening.
    • Instance and image security.
    • Identity and Access Management (IAM) roles in Cloud Security.
    • Data Security.
  2. Exercise 10 – Quizzes.
Topic 2.6: Cloud Security Assessment
Summary: This topic will be discussing on the cloud security assessment. This will cover the vulnerability management in the cloud and the importance of cloud configuration. The content will be also discussing on the basic procedure on how to perform cloud-based penetration testing. Other typical security checking mechanism such as cloud intrusion detection in the cloud and log management will also be covered in this topic. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Assessment Concepts:
    • Cloud Penetration Testing Methodology.
    • Intrusion detection in the cloud.
    • Log management in the cloud.
  2. Exercise 11 – Quizzes.
Module 3: Cloud Computing Security Audit
Topic 3.1: Introduction to Security Audit
Summary: This topic will be covering the introduction of security audit, what is IT audit and what is security audit. This topic will also explain the differences between IT audit and security audit. The following is the sub-topics will be covered in the training module, as follows.
  1. Security Audit Introduction:
    • IT Audit.
    • Security Audit.
    • IT Audit vs. IT Security Audit.
  2. Exercise 12 – Quizzes.
Topic 3.2: Cloud Security Audit
Brief Info: This topic will be covering the cloud security audit overview and the cloud security audit process flow. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Audit Overview:
    • Overview of Cloud Security Audit
    • Cloud Security Audit Process Flow
  2. Exercise 13 – Quizzes.
Topic 3.3: Cloud Security Standards & Best Practices
Summary: This topic will be covering the cloud security standards and best practices. The content will be discussing the relevant standards and best practices from existing entities such as ISO, CSA etc. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Standards and Best Practices: Examples.
  2. Exercise 14 – Quizzes.
This quiz is to measure trainees understanding on the topic

Topic 3.4: Governance in Cloud
Summary: This topic will be covering on the governance in cloud, an overview of cloud governance such as IT governance requirements, governance aspects etc. This will also cover the cloud governance and risk such as risk factor and risk list in the cloud. The following is the sub-topics will be covered in the training module, as follows.
  1. Cloud Security Governance and Requirements:
    • Cloud Governance Overview.
    • Cloud Governance & Risk.
  2. Exercise 15 – Quizzes.

Ts. Ahmad Dahari Bin Jarno
Senior Analyst
Malaysian Security Evaluation Facility (MYSEF)
CyberSecurity Malaysia

Ahmad Dahari Bin Jarno, proudly holds cybersecurity professional certifications and experienced wisely in Common Criteria Evaluation & Certification and cybersecurity penetration testing more than 10 years. Graduated from Malaysia Multimedia University (MMU) as Bachelor (BHons) of Electronics Engineering Majoring in Computer. Started his career with CyberSecurity Malaysia as Security Analyst and currently with given trust as Research Lead (XPERTS Unit) under CyberSecurity Malaysia MySEF (CSM MySEF) Department, dedicating all his work in Common Criteria ICT product evaluation & certification and cybersecurity assessment with additions of leading a team in exploration of cybersecurity research, development and advisory that produce in-house solutions such as: test method, test tools, guideline, trainings and etc. In the domain of cybersecurity as his passion, exposed and experienced widely in the area of network security assessments, various type of penetration testing, web application assessment, web servers/appliances compliance testing and security audit. New exploration technology covers cybersecurity on Smart Card (OS, Applet & Reader) Evaluation, Hardware Security, Biometric Fingerprint Security, and innovation of assessment in Cloud Computing Security.

 

  • 7 - 9 February 2023
  • 22 - 24 February 2023
*dates are tentative, unless specified

MYR3,780.00 (subject to 6% SST)

Please click here to register


Contact us to request for a quotation

18 CPD Point

Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org

 

Have any inquiries? Check out the FAQ