Course
Title |
: Cloud
Computing Security Reference Architecture
Framework |
Course
Duration |
: 2 Day
Face-to-Face Classroom and 2 Day Online
Instructor Led Workshop
: Online
workshop is delivered in two days, two units
each day between 9:30 am to 1 pm and 2 pm to
5:30 pm |
Course Fee |
: Available
upon request (Write to us at info@tlcpak.com) |
Course
Location |
: TLC,
Customer Onsite and Online |
Course Code |
: TN221 |
Deliverables |
:
Comprehensive Student Guide and Workshop
Certificate |
Customer onsite
workshop can also be conducted for customers in
Lahore, and Islamabad
PURPOSE:
In the era of digital transformation,
the importance of information security and
cybersecurity have been emerged as an essential
education/training and is recommended to take by
users from all LOB’s as a part of an
organizational internal security policy helping
them to understand and combat against latest types
of threats, risk and vulnerabilities and how to
effectively safeguard their endpoint
devices.
Attacks on cloud accounts up 630% during
January and April 2022 time frame. As per McAfee
survey, it is found that overall enterprise use of
cloud services increased by 50%, and use of
collaboration services such as Cisco WebEx,
Microsoft Team, Slack and Zoom increased up to
600%. In a nut shell, security vendors attributed
much of those increases to the COVID-19 pandemic.
Also, 48% of employees according to Gartner's
Board of Directors 2022 survey, 48% of employees
are working remotely now, versus 30% before the
pandemic. 82% of organizations are planning to
allow their employees to continue working from
home at some level. 40% of companies that suffer a
massive data loss will never reopen - Gartner
Group.
Security in the cloud is just as vital
as security in on-premises environments. Hardening
a system is a way to protect it by reducing
vulnerability. While hundreds of security
recommendations may exist to harden any one
technology, this course especially focuses on
standard cloud security best practices, knowing
key objectives prior embarking in the cloud,
consensus-driven security configuration guidelines
and recommendations subject to different cloud
services and deployment models.
Moreover, providing a superior online
experience for a global customer base is no longer
optional. As demand increases for web-based
services and applications, businesses must satisfy
customer needs while ensuring that their websites
and applications remain as secure, fast, and
reliable as possible. With this shift, enterprises
face new challenges and opportunities for growth —
from anticipating and meeting customers’ digital
needs to mounting a strong defense against
web-based attacks, overcoming latency issues,
preventing site outages, and maintaining network
connectivity and performance.
This course
provides an overview of the benefits of cloud
computing and how various types of business
applications and services can be used in a cloud
network scenario. It aims to provide the learner
with a good knowledge base of cloud computing
concepts and the related enabling technologies. It
outlines the pros and cons of cloud computing, the
different cloud service models provided, cloud
security aspects to consider, and the options for
moving your services into the cloud. Other key
concepts covered include cloud data storage
solutions, Service Oriented Architecture and the
cloud, and identity and access management services.
Transitioning to
the cloud is one of the most significant technology
shifts your company will face. Last year in 2023,
over 80% of organizations operating in the cloud
experienced at least one compromised account each
month, stemming from external actors, malicious
insiders, or unintentional mistakes.
The specifics of
cloud security activities may vary depending on your
cloud platforms and use cases, however, there are
some best practices that every organization should
follow.
The training course flow will be a mix
of lectures & classroom discussions so that
participants can have a detailed understanding of
various components of cybersecurity technologies.
ABOUT THE
WORKSHOP:
Security in the
cloud is just as vital as security in on-premises
environments. Hardening a system is a way to protect
it by reducing vulnerability. While hundreds of
security recommendations may exist to harden any one
technology, this course especially focuses on
standard cloud security best practices, knowing key
objectives prior embarking in the cloud,
consensus-driven security configuration guidelines
and recommendations subject to different cloud
services and deployment models.
Moreover,
before you invest in migrating your
application to cloud, there is a need to
study what measures to be taken prior
selecting
cloud security tools that not only support
feature like DLP and Shadow IT but also
understand how to provide end
to end API
security.
We will
be covering the role of Multi-Mode
Next-Generation CASB Architecture
details in this two-day online
workshop. It is
important
to perform a due diligence and thorough
planning session prior selecting your CASB
product/vendor. You should
avoid
taking a wrong decision in opting your
solution based on API-only CASB
architecture and Multi-Mode First
Generation
CASB
Architecture. We will be covering
Multi-Mode Next-Generation CASB
Architecture as one of the unit in our
course.
|
|
Nevertheless,
providing a superior online experience for a global
customer base is no longer optional. As demand
increases for web-based services and applications,
businesses must satisfy customer needs while
ensuring that their websites and applications remain
as secure, fast, and reliable as possible. With this
shift, enterprises face new challenges and
opportunities for growth — from anticipating and
meeting customers’ digital needs to mounting a
strong defense against web-based attacks, overcoming
latency issues, preventing site outages, and
maintaining network connectivity and performance.
ABOUT THE
INSTRUCTOR:
This workshop shall
be delivered by IBM Certified Cloud Architect who is
also a TOGAF 9 Certified and IBM Certified
Infrastructure System Architect and an experienced
trainer with 25+ years of career experience
imparting education and training services both
locally and internationally and have worked for
international enterprise technology vendors
including IBM, Fujitsu, and ICL. Our instructor
holds various industry professional certifications
in the space of enterprise servers and storage
technologies, Information Security, Enterprise
Architecture, ITIL, Virtualization, Green IT, and a
co-author of 10 IBM Redbooks.
TARGETED
AUDIENCE:
This workshop is intended for resources
from:
- Different LOB's including application,
audit, risk, compliance, information security
and cybersecurity professionals, IT operations,
system integrators, IT consultants, solution
architects and legal professionals.
- CXO's, Managers, Senior IT and
Business Leaders who want to refresh their
present knowledge in the field of information
and cybersecurity.
- Students and fresh engineering
graduates.
PREREQUISITES:
Participants
attending this workshop should be familiar with basic
Information Technology (IT) and Security concepts,
business challenges and the role of general system
wide infrastructure technologies and their
applications.
COURSE
OUTLINE:
Unit 1
– Cloud Computing Reference Architecture
Fundamentals
- Cloud
Computing and Cloud Storage Defined.
- Defining
Service Oriented Architecture (SOA) and
Web Services.
- Describe
Representational State Transfer (REST)
Architecture.
- Understand
Cloud Service and Deployment Models'
their details.
- Cloud
Computing Reference Architecture - CCRA.
- NIST
Cloud Computing Reference Architecture.
- Cloud
Security Architecture, Service and
Deployment Models.
- Implementing
Cloud Reference Architecture, Best
Practices and Use Cases.
- Cloud
Key Actors and their Deliverables and
Cloud Computing Provisioning Best
Practices.
- Problems
in moving workloads to cloud and
Application Readiness.
- Cloud
solution to common IT problems &
challenges.
- Cloud
Migration from Architecture through
Implementation.
- Business
benefits of using Cloud Storage and
associated Risks.
- Cloud
Provider - Cloud Service Management
Essentials.
- Scalable
Cloud Services Architecture &
Storage Access Protocols.
- Types
of Cloud Storage Models and their types
and applications.
- Understand
API and Cloud storage API protocols.
- Obstacles
to establish connectivity to Object
Cloud Storage.
- Understanding
the Role of Cloud Storage Gateways.
- Protocols
supported by Cloud Storage Gateways.
- What
are the negatives to cloud computing and
Security Concerns.
- Cloud
enabling infrastructure technology used
by low cost CSP.
- Unit
1 Assessment
Unit 2
-The Role of Secure API Strategy
Implementation
- API Evolution Creates
New Activities for Business and IT
Leaders.
- Differentiating
between Microservices and APIs Components.
- API Strategy,
Planning and challenges in implementing
API Strategy.
- How new API Top 10
categories of vulnerabilities addresses
these vulnerabilities.
- API Strategy
Implementation Steps – The Four Key
Pillars.
- Types of API
Strategies, API Approach and their
Use-cases.
- Top Objectives and
Monetization Strategies of API Adoption.
- End-to-end API
Management Lifecycle.
- End-to-End steps in
accomplishing successful API
Implementation and Management.
- Understand API
Platform Capabilities and Deployment
Options.
- API Exposures and
Connections – A Critical Factor.
- How APIs are used and
frequency of API updates.
- Types of API Security
Incidents, Impacts and Top API Security
Challenges.
- Uncovering API
vulnerabilities that are of greatest
concern.
- Using 9-Types of API
Testing – A Recommended Path.
- Points to consider,
questions to ask when evaluating API
security.
- Knowing Security
Capabilities an API Gateway should
Provide.
- Cloud Web Application
& API Protection – WAAP is way
forward.
- Unit 2 Assessment.
|
Unit 3
– Ensure Secure and Reliable Network
Connection
- Ensure
secure, Fast, and Reliable Customer
Connections.
- Overcome
DNS challenges and strengthening client
side security.
- Explore
client-side attacks and client side
protection.
- TLS
challenges and effectively implementing
TLS based solutions.
- Global
CDN, Faster Routing and Mobile
Optimization.
- How
to select tools for optimal network path
selection.
- Web
Application Firewall and their
challenges.
- Strengthen
Security Posture for your WAF
Infrastructure.
- Bot
Mitigation and their challenges.
- DDoS
Attack Mitigation and what to look for
in a DDoS mitigation services provider.
- Understand
Load Balancing and its challenges.
- Detect
Anomalous behavior and Secure Web
properties at the Edge.
- Data
Loss Prevention challenges and an
end-to-end DLP solution.
- Edge
Programmability challenges.
- Unit
3 Assessment.
Unit 4 –
The Role of CASB and SASE in Cloud
Computing
- Cloud Management
Components and Cloud Architecture.
- Cloud Computing
Reference Architecture – CCRA.
- NIST Cloud Computing
Reference Architecture.
- Pillars of Robust
Cloud Security and Top Cloud Application
Security Threats.
- Understand Cloud
Access Security Broker.
- Security features
offered by Cloud Access Security Broker.
- How Cloud Access
Security Broker work?
- Requirements of a
CASB Solution and why do I need a CASB
solution?
- Cloud Access Security
Broker Solution Deployment Models.
- Three key
considerations for choosing a CASB.
- Multi-Mode Next-Gen
CASB Architecture.
- Use Cases and Best
Practices for Cloud Access Security Broker
implementation.
- Cloud Access Security
Broker Vs. Secure Access Service Edge.
- Privileged Access
Management Defined.
- Unprivileged to
Privileged Access Management using Zero
Trust Architecture.
- Understand Secure
Access Service Edge (SASE).
- SASE Architecture –
CASB within SASE.
- Pros and Cons of SASE
& CASB– Advantages and challenges for
enterprises.
- Comparative Analysis
on SASE Vs. CASB.
- Unit 4 Assessment.
|
|