: Istanbul-Turkey: +905395991206 - Amman-Jordan: +962785666966 - London (UK): +447481362802

Business Information Technology Planning, Deployment & Management

Cloud Management and Security: Principles and Best Practice


Cloud computing is a new concept using old technologies. It has quickly become a vital tool in organizations across all industries as an Internet-scale computing infrastructure. Nevertheless, despite Cloud computing’s increasing relevance and popularity, there is a lack of understanding of the security risks associated with Clouds and optimal approaches for migration into Clouds. This course covers these from a practical angle; specifically, it covers Cloud computing architecture, management services, and security challenges. It also discusses Cloud migration planning and the main requirements to move current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical computing infrastructure

Targeted Groups:

  • IT and Infrastructure Leaders
  • Decision-Makers (CxO)
  • Risk Analysts
  • Strategic Planners
  • Architects
  • Administrators
  • Software and Business Developers
  • Project Managers

Course Objectives:

At the end of this course the participants will be able to:

  • Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
  • Explain cloud structure, properties, and management services
  • Set a cloud adoption strategy
  • Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
  • Analyze the major risks associated with the different cloud services and deployment models
  • Discuss the main principles, mechanisms and best practices for treating cloud risks
  • Demonstrate the discussed concepts using practical case studies, business models and industrial tools

Targeted Competencies:

  • Cloud management
  • Identity management
  • Access management
  • Security risks management

Course Content:

Unit 1: Cloud Overview:

  • Cloud definition, misconceptions and evolution
  • Cloud services and deployment types
  • Challenges

Unit 2: Cloud Management:

  • Cloud structure and its properties
  • Virtual and application layer management services
  • Cloud dynamic nature and its challenges
  • Application development and integration within clouds
  • Security best practices for automating cloud infrastructure management
  • Clarifying the concepts using industrial platforms

Unit 3: Establishing Trust in Clouds:

  • Defining cloud trustworthiness
  • Its properties
  • Assessing cloud trustworthiness
  • Establishing trust in:
  • Private
  • Hybrid
  • Community
  • Public cloud deployment types
  • Establishing trust in:
  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
  • Clarifying the concepts using OpenStack management platform

Unit 4: Identity and Access Management:

  • Authentication
  • Authorization
  • Access management
  • Federated access management
  • Insiders VS attackers
  • Insiders analysis and management
  • Related industrial tools:
  • Cloud insider treatments
  • Cloud strong authentication

Unit 5: Provenance in Clouds:

  • Definition and attributes
  • Challenges faced
  • Security risks mitigation using provenance
  • Forensic investigation
  • Trustworthy operational management
  • Proactive and predictive management
  • Bill assurance
  • Related industrial tools