Online or onsite, instructor-led live Cloud Security training courses demonstrate through interactive hands-on practice how to use cloud security tools and techniques to protect cloud-based systems, data, and applications.
Cloud Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cloud Security training can be carried out locally on customer premises in Bhutan or in NobleProg corporate training centers in Bhutan.
Cloud Security is also known as Cloud Computing Security.
NobleProg -- Your Local Training Provider
Bhutan, Thimphu - Classroom
near Le Méridien , Chorten Lam, Thimphu, Bhutan, 11001
Set in Thimphu, this classroom is well located in Chorten Lam with all amenities and WiFi.
For Sales Enquires and Meetings
All our centres have batches running on weekdays and weekends hence, please note that, in most cases, usually we are not able to organise ad hoc sales meetings, especially on our classrooms as they are all occupied with ongoing training sessions . Please contact us by e-mail or phone at least one day earlier to make an appointment with one of our consultants at our corporate offices.
Bhutan, Paro - Classroom
near Le Méridien Riverfront, thimphu hwy, Shaba, Paro, Bhutan, 12001
Set in Paro, this classroom is well located near Paro-Thimphu Highway around 4 km from the airport, and 7 km from Rinpung Dzong, and possess all amenities and WiFi.
For Sales Enquires and Meetings
All our centres have batches running on weekdays and weekends hence, please note that, in most cases, usually we are not able to organise ad hoc sales meetings, especially on our classrooms as they are all occupied with ongoing training sessions . Please contact us by e-mail or phone at least one day earlier to make an appointment with one of our consultants at our corporate offices.
The CCSK Foundation course starts with the fundamentals, then increases in complexity as it works through all 16 domains of the CSA Security Guidance, recommendations from the European Union Agency for Network & Information Security (ENISA), and an overview of the Cloud Controls Matrix.
This is a Cloud Security Alliance (CSA) authorized course and NobleProg is an official CSA Training Partner.
This course is delivered by CSA Authorized CCSK Instructors.
All attendees receive:
official CSA CCSK Foundation course certificates
official CCSK Foundation Student Handbooks
1 CCSK exam voucher and 1 re-attempt exam voucher
This course covers the most current version of the CCSK exam - currently version 4.1.
Description:
This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of exercises involving a scenario that brings a fictional organization securely into the cloud. After completing this training, students will be well prepared for the CCSK certification exam, sponsored by Cloud Security Alliance. This second day of training includes additional lecture, although students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises.
Objectives:
This is a two day class that begins with the CCSK- Basic training, followed by a second day of additional content and hands-on activities
Target Audience:
This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.
Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.
The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.
The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Understand major threats and risks in the cloud domain
Learn about elementary cloud security solutions
Get information about the trust and the governance regarding the cloud
Have a practical understanding of cryptography
Get extensive knowledge in application security in the cloud
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Understand the challenges of auditing and evaluating cloud systems for security
Learn how to secure the cloud environment and infrastructure
Get sources and further readings on secure coding practices
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client.
Customization options The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
Read more...
Last Updated:
Testimonials (3)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job
Toby
Course - Application Security in the Cloud
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.
Tim Wilkes - Gamma
Course - OpenStack Security
The way in which he explained to us during the 2 days and his way of being, which makes learning enjoyable.
Victor Miguel Prado Saster - Blue Indico Investments, S.L.U.
Course - CCSK - Certificate of Cloud Security Knowledge - Plus
Online Cloud Security training in Bhutan, Cloud Security training courses in Bhutan, Weekend Cloud Security courses in Bhutan, Evening Cloud Security training in Bhutan, Cloud Computing Security instructor-led in Bhutan, Cloud Security private courses in Bhutan, Cloud Computing Security coaching in Bhutan, Cloud Security on-site in Bhutan, Online Cloud Computing Security training in Bhutan, Cloud Computing Security instructor-led in Bhutan, Evening Cloud Security courses in Bhutan, Cloud Security instructor in Bhutan, Cloud Security classes in Bhutan, Cloud Computing Security one on one training in Bhutan, Cloud Security trainer in Bhutan, Cloud Computing Security boot camp in Bhutan, Weekend Cloud Computing Security training in Bhutan