Training Cloud Security Essentials – 3 days

Class overview :

As organizations transition to cloud computing technology, security issues are a vital concern. In order to protect your sensitive data and maintain regulatory compliance, you must address the unique cybersecurity challenges faced when moving to a cloud environment.

Class goals :

  • Analyze, manage and implement security for public and private clouds
  • Establish data integrity and privacy in the cloud to manage risk
  • Maintain platform security and protect data confidentiality
  • Protect networks, operating systems and applications within various cloud deployments
  • Achieve organizational cybersecurity compliance with effective cloud governance
  • Exploit the cloud for efficient disaster recovery and business continuity

Content of Cloud Security Essentials

Cloud Computing Essentials

  • Cloud computing service models: Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)
  • Public
  • Private
  • Virtual Private
  • Hybrid
  • Establishing cybersecurity fundamentals
  • Determining when security goals require a private cloud

Risk Management and Division of Responsibility

Managing risks in the cloud

  • Centralizing information with SaaS to increase data security
  • Implementing and managing user authentication and authorization
  • Permission and password protection

Negotiating security requirements with vendors

  • Identifying needed security measures
  • Establishing a service level agreement (SLA)
  • Ensuring SLAs meet organizational security requirements

Securing the Cloud Infrastucture

Securing the platform

  • Restricting network access through security groups
  • Configuring platform-specific user access control
  • Integrating with cloud authentication and authorization systems

Compartmentalizing access to protect data confidentiality

  • Securing data in motion and data at rest
  • Identifying your security perimeter
  • Techniques for recovering critical data

Operating System and Network Security

Locking down cloud servers

  • Ensuring the cloud is configured according to best practices
  • Confirming safeguards have been implemented
  • Networking
  • Operating Systems
  • Applications
  • Scanning for and patching vulnerabilities
  • Controlling and verifying configuration management

Leveraging provider-specific security options

  • Defining security groups to control access
  • Filtering traffic by port number
  • Discovering and benefiting from the provider’s built-in security
  • Protecting archived data

Achieving Security in a Private Cloud

Taking full responsibility for cybersecurity

  • Managing the risks of public clouds
  • Identifying and assigning security tasks in each SPI service model: SaaS, PaaS, IaaS

Selecting the appropriate product

  • Comparing product-specific security features
  • Considering organizational implementation requirements

Virtual Private Cloud (VPC)

  • Simulating a private cloud in a public environment
  • Google Secure Data Connector
  • Amazon VPC
  • Industry-standard, VPN-encrypted connections

The hybrid cloud alternative

  • Connecting on-premises data with cloud applications
  • Securely bridging with VPC
  • Dynamically expanding capacity to meet business surges

Meeting Compliance Requirements

Managing cloud governance

  • Retaining responsibility for the accuracy of the data
  • Verifying integrity in stored and transmitted data
  • Demonstrating due care and due diligence
  • Supporting electronic discovery
  • Preserving a chain of evidence

Assuring compliance with government certification and accreditation regulations

  • Sarbanes-Oxley
  • Data Protection Act
  • Limiting the geographic location of data
  • Following standards for auditing information systems
  • Negotiating third-party provider audits

Preparing for Disaster Recovery

Implementing a plan to sustain availability

  • Reliably connecting to the cloud across the public internet
  • Anticipating a sudden provider change or loss
  • Archiving SaaS data locally
  • Addressing data portability and interoperability in preparation for a change in cloud providers

Exploiting the cloud for efficient disaster recovery options

  • Achieving cost-effective recovery time objectives
  • Employing a strategy of redundancy to better resist DoS

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …


Rue Beeckmans, 53
1180 Bruxelles

Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Gsm : +32 485 212 722
Email :


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s