Identify and explain the Cloud Computing concepts and definitions based on the ISO/IEC 17788 and NIST standards.
Identify and explain the Cloud Security Alliance’s Notorious Nine, Treacherous Twelve and Egregious Eleven.
Understand, and be able to differentiate between, the various service delivery models, frameworks and hypervisor threats that are incorporated into the cloud computing reference architecture.
Demonstrate the application of appropriate security strategies and be able to recommend appropriate controls for protecting data at rest, data in use and data in motion.
Discuss strategies for data ownership, data sovereignty, data classification and implementing appropriate measures for assurance for ensuring privacy, compliance with regulatory agencies and working with authorities during legal investigations.
Understand the challenges for data centre design, forensic analysis and cloud environment deployments and recommend appropriate risk mitigation strategies.
Understand and apply Business Continuity Planning and Disaster Recovery procedures for disaster situations.
Design appropriate identity and access management solutions.
Comprehend and apply appropriate processes and frameworks including the Software Development Life-Cycle (SDLC) process and secure operations.
[su_testimonial_box position=”Live Virtual Training, October 2020″]Chris Evans is an excellent cyber security and cloud instructor. He set a lovely tone in the virtual Zoom class, was extremely knowledgeable and approachable instructor with global professional experience. He worked very respectfully with students based outside Australia, including those for whom English was a secondary language. Chris was really generous with his time, was not judgemental about students needing to come/go to meet various workplace obligations. Good control of the class and content and pace. I look forward to working with Chris and ALC again![/su_testimonial_box]