Cloud Introduction o Including deep dive into the virtualization layer
Cloud and Business Objetives Meet as One
Cloud Security from A-Z
Design Doctrines
How do we find Trusted Cloud Services?
Data Security in the Cloud
Data Life Cycle
Data Storage Designs for the Cloud
Strategies for Designing Data Security
Data Discovery and Classification Technologies
Understanding Jurisdictional Data Protection for Personally Identifiable Information (PII)
All about Data Rights Management
Data Retention, Deletion, and Archival Policies
Auditability, Traceability, and Accountability of Data Events
The Basis for Cloud Security and surrounding Environment
Understanding Cloud Infrastructure Components
Analyze Risks in the Cloud Infrastructure
Security Control Design for the Cloud
Disaster Recovery and Business Continuity Management for the Cloud
Application Security in the Cloud
Training and Awareness for Application Security
Software Development Life Cycle (SDLC) Process
Learning to apply the Secure Software Development Life Cycle
Verifying the use of Secure Software
Proper use of Identity and Access Management (IAM) Solutions
Additional components used in the Cloud Application Architecture
Software Assurance and Validation
Managing Cloud Security
Supporting the Data Center Design
Physical Infrastructure for the Cloud
Running the Physical Infrastructure
Managing the Physical Infrastructure
Building the Logical
Infrastructure for the Cloud
Running the Logical
Infrastructure for the Cloud
Managing the Logical
Infrastructure for the Cloud
Maintaining Compliance with Regulations and Controls
Conducting Risk Assessment for the Logical and Physical Infrastructure
Properly plan for the Collection, Acquisition and Preservation of Digital Evidence
Managing Communications with Relevant Parties
Legal Issues, Auditing, and Compliance
Discussionh the Legal Requirements and Risks Unique to the Cloud
Privacy Issues and the relevance of Jurisdiction
The Audit Process and Methodologies for the Cloud
Cloud to enterprise Risk Management
Contract design for Outsourcing and Cloud Agreements
Managing Vendors in the Cloud
Labs-These are not all required during class but will be leveraged to better understand the complexities in cloud security. This is a general list, not a complete list of every lab.
Cloud Migration Evaluation
Understanding the virtual layer, hacking included
Understanding how network traffic routes in the virtual and cloud layer
Harden the virtual layer Management layer, Hypervisor and the VMs.
Setup and Deploy an IaaS Solution
Setup SaaS Solution
Setup PaaS Solution
Evaluate SaaS, PaaS, and IaaS solutions for security capabilities