Cloud Management & Security


Course Info

Code PI1-113

Duration 5 Days

Format Classroom

Cloud Management & Security

Course Summary

The major public cloud vendors continue to invest in their services and improve cloud security, such as their ability to stop distributed denial-of-service attacks. Some experts say that today's cloud attacks are far less devastating than on-premises ones because cloud attacks are generally limited to a single misconfigured service, whereas a local attack might devastate an entire infrastructure. However, organisations that heavily rely on IT systems must remain vigilant to guard against security threats. Google, AWS and Microsoft, among others, do not take full responsibility to keep cloud data safe. Cloud users must understand their shared responsibility in the cloud to protect their data. Cloud security best practices include configuration management, automated security updates on SaaS, and improved logging and access management.

Cloud security breaches and incidents still occur even as security technologies improve, and service providers protect their networks. People can attack network hosts and web apps as fast as they can be fortified. Cloud administrators should test their environments and have the latest security audits and reports. Business owners should take care when adopting new technologies, such as AI and machine learning, which use many data sources and therefore broaden the range for potential attacks.

There is also a need to fight the false notion that just because an organisation is compliant, an organisation is secure. Adherence to standards does nothing to stop phishing attacks or other cloud breaches. An organisation must hone their alignment with regulations and rules with a cloud governance framework.

The success of any cloud management depends not just on the proper use of the tools available and automation, but also on having a competent IT staff in place. IT and business teams must collaborate naturally in order to assimilate to a cloud culture and understand the business's goals.


  • To identify and assess cloud services.
  • To audit and adjust security settings.
  • To encrypt data.
  • To use the Cloud vendor service contracts to ensure the confidentiality, integrity, and availability of their data.
  • To identify cybersecurity risks, cyber-attacks, and the ways to defend from them.
  • To optimise Cloud practices.
  • To adhere to data regulations and compliance.

This course is designed for any professional that requires a greater understanding when it comes to potential cybersecurity breaches, managing data encryption, and legal compliances in regard to the Cloud. It would be most beneficial for:

  • Technology Engineers, Chief Technology Officer (CTO) and Chief Information Officer (CIO)
  • Key Application Development and Data Research Personnel
  • Strategic Development Directors
  • Crisis Management
  • Team leaders
  • Senior Managers
  • Technical professionals
  • IT specialists
  • Legal Personnel

This course will use a variety of adult learning techniques to ensure a maximum understanding, comprehension and retention of the information presented.

The training course is highly interactive and is carefully designed to provide the best mix of experience, theory, and practice in a professional learning environment. The course will provide real case studies, and practical applications through “hands-on” action learning. Delivery will be by presentation, group investigations, training DVD and interactive seminars.


Course Content & Outline

Section 1: Introduction to Cloud Computing
  • Learn delivery models such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
  • Understand Cloud types (Public, Private, Hybrid).
  • How to choose a cloud service provider.
  • What are the Cloud computing costs?

 

Section 2: Evolution of IT Security
  • How to categorise physical and electronic risks.
  • Understanding the legal and regulatory considerations.
  • What are the current threats and trends an organisation faces?
  • Learn different networking and communication technology.
  • Understanding different computer system designs.

 

Section 3: Compliance & Legal Considerations
  • Understanding compliance challenges for the Cloud.
  • What are the privacy concerns?
  • What is data sovereignty?
  • Understanding Cloud supplier agreements.

 

Section 4: Crisis Management & Risk Assessment
  • How to approach risk assessments for the Cloud.
  • Understanding Internal and external assessments.
  • Understanding data security in the Cloud.
  • Leaning encryption architectures.

 

Section 5: Identifying & Responding to Data Breaches
  • How to recover from data loss or a data breach.
  • Understanding key factors to identify a security breach.
  • Learning crisis management planning.
  • How to deal with the initial crisis and media management.