YOU’VE MADE A BRAVE DECISION, WELCOME FOR UPCOMING BATCHES

Cyber Security Training:

COURSE INTRODUCTION:
  • The participants will gain knowledge about secured computer networks, securing clean and corrupted systems, and protecting personal data
  • The participants will understand key terms and concepts in cyber law, intellectual property and cybercrimes, trademarks and domain theft
  • The participants will be able to check secure software development practices
  • The participants will understand principles of web security
  • The participants will be able to incorporate approaches for incident analysis and response
  • The participants will be able to incorporate approaches for risk management and best practices
  • The participants will gain an understanding of cryptography, how it has evolved, and some key encryption techniques used today
  • The participants will develop an understanding of security policies (such as confidentiality, integrity, and availability), as well as protocols to implement such policies
  • The participants will gain familiarity with prevalent network and distributed system attacks, defenses against them, and forensics to investigate the aftermath
  • PRE-REQUISITES: Computer fundamentals, Programming fundamentals and knowledge of statistics
  • DURATION: 6 Days (48 HRS)
  • CERTIFICATON: At the end of the course you will get the certificate for completing the training.

Course Content:

ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS

  • Understand cloud computing concepts
  • Describe cloud reference architecture
  • Understand security concepts relevant to cloud computing
  • Understand design principles of secure cloud computing
  • Identify trusted cloud services

CLOUD DATA SECURITY

  • Understand Cloud Data Life Cycle
  • Design and Implement Cloud Data Storage Architectures
  • Understand and implement Data Discovery and Classification Technologies
  • Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
  • Design and implement Data Rights Management
  • Plan and Implement Data Retention, Deletion, and Archival policies
  • Design and Implement Auditability, Traceability, and Accountability of Data Events

CLOUD PLATFORM INFRASTRUCTURE SECURITY

  • Comprehend Cloud Infrastructure Comp
  • Analyze Risks Associated to Cloud Infrastructure
  • Design and Plan Security Controls
  • Plans Disaster Recovery & Business Continuity Management

CLOUD APPLICATION SECURITY

  • Recognize Need for Training and Awareness in Application Security
  • Understand Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Comprehend the Software Development Life Cycle (SDLC) Process
  • Apply the Secure Software Development Life Cycle
  • Comprehend the Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions

OPERATIONS

  • Support the Planning Process for the Data Center Design
  • Implement and Build Physical Infrastructure for Cloud Environment
  • Run Physical Infrastructure for Cloud Environment
  • Manage Physical Infrastructure for Cloud Environment
  • Build Logical Infrastructure for Cloud Environment
  • Run Logical Infrastructure for Cloud Environment
  • Manage Logical Infrastructure for Cloud Environment
  • Ensure Compliance with Regulations and Controls
  • Conduct Risk Assessment to Logical and Physical Infrastructure
  • Understand the Collection and Preservation of Digital Evidence
  • Manage Communications with Relevant Parties Domain

LEGAL AND COMPLIANCE

  • Understand Legal Requirements and Unique Risks Within the Cloud Environment
  • Understand Privacy Issues, Including Jurisdictional Variances
  • Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • Understand Implication of Cloud to Enterprise Risk Management
  • Understand Outsourcing and Cloud Contract Design
  • Execute Vendor Management

Use cases and Case studies