Thursday, December 29, 2011
Cloud Computing Security
Pada training ini akan digambarkan bagaimana kekuatan dan kelemahan dalam mengamankan informasi perusahaan Anda dengan pendekatan Cloud yang berbeda, dimana serangan-serangan itu biasanya fokus pada infrastruktur, jaringan komunikasi, data, atau layanan. Materi disajikan dengan framework yang jelas dan ringkas untuk mengamankan aset bisnis Anda saat membuat teknologi baru ini.
CONTENT
1. Introduction to Cloud Computing and Security
- Understanding Cloud Computing
- The IT Foundation for Cloud
- The Bottom Line
- An Historical View: Roots of Cloud Computing
- A Brief Primer on Security: From 50,000 ft
- A Brief Primer on Architecture
- Security Architecture: A Brief Discussion
- Cloud Is Driving Broad Changes
- Cloud Reference Architecture
- Control over Security in the Cloud Model
- Making Sense of Cloud Deployment
- Making Sense of Services Models
- How Clouds Are Formed and Key Examples
- Real-world Cloud Usage Scenarios
- Cloud Computing: Security Concerns
- Assessing The Risk Tolerance in Cloud Computing
- Legal and Regulatory Issues
- Security Requirements for the Architecture
- Security Patterns and Architectural Elements
- Cloud Security Architecture
- Planning Key Strategies for Secure Operation
- Overview of Data Security in Cloud Computing
- Data Encryption: Applications and Limits
- Cloud Data Security: Sensitive Data Categorization
- Cloud Data Storage
- Cloud Lock-in (the Roach Motel Syndrome)
- Overall Strategy: Effectively Managing Risk
- Overview of Security Controls
- The Limits of Security Controls
- Best Practices
- Security Monitoring
- Private Clouds: Motivation and Overview
- Security Criteria for Ensuring a Private Cloud
- Selecting a CSP: Overview of Assurance
- Selecting a CSP: Overview of Risks
- Selecting a CSP: Security Criteria
- Evaluating Cloud Security
- Checklists for Evaluating Cloud Security
- Metrics for the Checklists
- Satu PC multimedia dengan LCD monitor untuk satu peserta
- Modul materi dalam bentuk cetak hardcover dan CD
- Certificate of course completion
- Bebas akses Internet kecepatan tinggi
- Training kit
- Makan siang dan snack dua ka
Subscribe to:
Post Comments (Atom)




No comments:
Post a Comment