Available Training Rooms

  • Classroom Training
    PRIVATE BATCH
  • Virtual Instructor-led Training
    PUBLIC PROGRAM
  • On Demand Training
    ON DEMAND
  • Hybrid Training
    BLENDED

Course Details

Module 1

Architectural Concepts & Design Requirements
Cloud computing concepts & definitions based on the ISO/IEC 17788 standard: security concepts and principles relevant to secure cloud computing.
• Understand Cloud Computing Concepts
• Describe Cloud Reference Architecture
• Understand Security Concepts Relevant to Cloud Computing
• Understand Design Principles of Secure Cloud Computing
• Identify Trusted Cloud Services

Module 2

Cloud Data Security
Concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability in cloud environments.
• Understand Cloud Data Lifecycle
• Design and Implement Cloud Data Storage Architectures
• Design and Apply Data Security Strategies
• Understand and Implement Data Discovery and Classification Technologies
• Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII)
• Design and Implement Data Rights Management
• Plan and Implement Data Retention, Deletion, and Archiving Policies
• Design and Implement Auditability, Traceability and Accountability of Data Events

Module 3

Cloud Platform & Infrastructure Security
Knowledge of the cloud infrastructure components, both the physical and virtual, existing threats, and mitigating and developing plans to deal with those threats.
• Comprehend Cloud Infrastructure Components
• Analyze Risks Associated to Cloud Infrastructure
• Design and Plan Security Controls
• Plan Disaster Recovery and Business Continuity Management

Module 4

Cloud Application Security
Processes involved with cloud software assurance and validation; and the use of verified secure software.
• Recognize the need for Training and Awareness in Application Security
• Understand Cloud Software Assurance and Validation

• Use Verified Secure Software
• Comprehend the Software Development Lifecycle (SDLC) Process
• Apply the Secure Software Development Lifecycle
• Comprehend the Specifics of Cloud Application Architecture
• Design Appropriate Identity and Access Management (IAM) Solutions

Module 5

Operations
Identifying critical information and the execution of selected measures that eliminate or reduce adversary exploitation of it; requirements of cloud architecture to running and managing that infrastructure; definition of controls over hardware, media, and the operators with access privileges as well as the auditing and monitoring are the mechanisms, tools,and facilities.
• Support the Planning Process for the Data Center Design
• Implement and Build Physical Infrastructure for Cloud Environment
• Run Physical Infrastructure for Cloud Environment
• Manage Physical Infrastructure for Cloud Environment
• Build Logical Infrastructure for Cloud Environment
• Run Logical Infrastructure for Cloud Environment
• Manage Logical Infrastructure for Cloud Environment
• Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)
• Conduct Risk Assessment to Logical and Physical Infrastructure
• Understand the Collection, Acquisition and Preservation of Digital Evidence
• Manage Communication with Relevant Parties

Module 6

Legal & Compliance
Addresses ethical behavior and compliance with regulatory frameworks. Includes investigative measures and techniques, gathering evidence (e.g., Legal Controls, eDiscovery, and Forensics); privacy issues and audit process and methodologies; implications of cloud environments in relation to enterprise risk management.
• Understand Legal Requirements and Unique Risks within the Cloud Environment
• Understand Privacy Issues, Including Jurisdictional Variation
• Understand Audit Process, Methodologies, and Required Adaption’s for a Cloud Environment
• Understand Implications of Cloud to Enterprise Risk Management
• Understand Outsourcing and Cloud Contract Design
• Execute Vendor Management

Public Program Schedule

There is no upcoming Public Batch Schedule, you can ask for Private Batch or for On-Demand Learning
Course NameDurationBrochureLocationScheduleEnroll

Download the syllabus

Download

The highest standard, The happiest learners

img

Sarada
Accenture Security-India | Training Operations

We appreciate the session conducted by Rohit Srivastava on Metaverse and Web3 Security as part of the ATCI Security Week 2022.   We received excellent feedback from the audience and look forward to many such collaborative opportunities in the future.

img

Rich Rushton
COO Layer 8 Training

Brijesh has done an excellent job. Things are a little bit slow in May – but RPS is high on our list to fill voids in our schedule. Thank you for being easy to work with!

Our Enterprise Clients

  • Logo - i Nautix
  • Logo - Genpact
  • Logo - Unisys
  • Logo - Fujitsu
  • Virtusa
  • Logo - Microland
  • Logo - GE
  • Logo - Intuit
  • Logo - Allstate

FAQ

Other Related Courses

    Related courses will be updated soon...

Other Certifications

Microsoft Training
AWS Training Partner
Google cloud
VMware Partner Logo
Redhat Partner logo
Citrix
Veritas

Students Certified

0167899

Keep me Updated

Get tips, latest Courses and Offers