Cloud Security Architecture - A practical approach

Hands-on security architecture for the public cloud using NIST CSF 2.0

Ratings: 4.05 / 5.00




Description

In this course you will learn how to master security architecture for the cloud. You will be using a methodology based on NIST Cybersecurity Framework 2.0 to take your architecture from business- and regulatory requirements all the way to components and capabilities that can be implemented in the public cloud.

The course will teach you how to map requirements to security measures and perform risk assessments. You will learn to master security strategy for the cloud and build a resilient security posture using a defense in depth strategy. You will also be able to prove compliance to regulations like GDPR and HIPAA using the methodology presented in the course. An important learning objective is also to create structured security architecture documentation.

This course is based on a Health Clinic example and has a hands-on focus for learning. After course completion, you can use all the provided methods and templates from the course in your own work. The resulting components and capabilities can be implemented in any cloud platform, but the course does not cover a cloud platform specific technical implementation of the architecture.

Course contents:

  • 2,5 hours of video lectures

  • 6 hands-on assignments

  • 6 Quizzes

  • 10 downloadable templates:

    • Requirements mapping template

    • Security requirements mapping template

    • Requirements mapping visualization template

    • Risk assessment template

    • Cloud security strategy template

    • Defense in depth assessment template and defense in depth circle template

    • Compliance mapping workbook

    • GDPR and HIPA visualization templates

    • Security architecture specification template

What You Will Learn!

  • Build cloud security architecture using a practical example
  • Apply a methodology based on NIST Cybersecurity Framework
  • Comply with regulations like HIPAA and GDPR
  • Manage risks like ransomware attacks and misconfigurations and select mitigation measures
  • Use a defense in depth strategy to build a resilient architecture
  • Create a cloud security strategy
  • Create security architecture documentation

Who Should Attend!

  • Students in IT Security
  • Professionals working with cloud architecture and security
  • Security architects
  • CISOs and other enterprise security staff