Read more here
Cloud Management and Security: Principles and Best Practice Why Attend
DATE
2024-09-23
LOCATION
To Be Determined;
Why Attend?
Cloud Management and Security: Principles and Best Practice Why Attend
Course Objectives
- This Course Objective Hasn't Been Provided Yet
Target Audience
IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers
- Cloud overview
- Cloud definition, misconceptions and evolution
- Cloud services and deployment types
- Challenges
- Cloud management
- Cloud structure and its properties
- Virtual and application layer management services
- Cloud dynamic nature and its challenges
- Application development and integration within clouds
- Security best practices for automating cloud infrastructure management
- Clarifying the concepts using industrial platforms
- Establishing trust in clouds
- Defining cloud trustworthiness
- Its properties
- Assessing cloud trustworthiness
- Establishing trust in:
- Private
- Hybrid
- Community
- Public cloud deployment types
- Establishing trust in:
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
- Clarifying the concepts using openstack management platform
- Defining cloud trustworthiness
- Identity and access management
- Authentication
- Authorization
- Access management
- Federated access management
- Insiders vs attackers
- Insiders analysis and management
- Related industrial tools:
- Cloud insider treatments
- Cloud strong authentication
- Provenance in clouds
- Definition and attributes
- Challenges faced
- Security risks mitigation using provenance
- Case studies for using provenance:
- Forensic investigation
- Trustworthy operational management
- Proactive and predictive management
- Bill assurance
- Related industrial tools
Join Our Community