Participants will be able to Describe the physical and virtual components of and identify the principle technologies of cloud-based systems
Participants will be able to Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments
Participants will be able to Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
Understand and Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture
Will be able to Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations
Contrast between forensic analysis in corporate data center and cloud computing environments
They will be able to Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing
Participant will also be able to Identify and explain the six phases of the data lifecycle and as well Explain strategies for protecting data at rest and data in motion
Participant will be able to Describe the role of encryption in protecting data and specific strategies for key management
Requirements
Basic experience on Information security and Information Technology is needed