CCS 2017 Keynote Addresses: Assoc. Prof. Margaret Chan School of Social Sciences Singapore Management University Prof. Jeanette Hoorn rofessor of Visual Cultures President Australia-Morocco Friendship Group Faculty of Arts Assoc.Prof. Anna Hickey-Moody Department of Gender & Cultural Studies School of Philosophical and Historical Inquiry Faculty of Arts and Social Sciences IE 2017 Keynote Addresses: Prof. Richard C. Geibel Dean of Master Program Digital Management Competence Center Entrepreneurship Germany Prof. Naresh Kumar Head of Entrepreneurship Education, Consultancy and Research Global Entrepreneurship Research and Innovation Centre Malaysia EMG 2017 Keynote Addresses:  Prof. Bennett Chi Kin Yim Associate Director of the Contemporary Marketing Centre Faculty of Business and Economics Hong KongAssoc. Prof. Humayun Murshed Faculty of Business, Justice and Behavioural Sciences AustraliaTHoR 2017Keynote Addresses:Prof. Larry DwyerTravel and Tourism Economics AustraliaAssoc. Prof. T. C. ChangDepartment of Geography Singapore HRM&PD Keynote Addresses: Prof. Adrian Wilkinson Director of the Centre for Work, Organisation and Wellbeing AustraliaAssoc. Prof. Paul HigginsHuman Resource Management Hong Kong Prof. Peter Gahan Founding Director of the Centre for Workplace Leadership Australia

Certified Cloud Security Specialist (CCSS)

Introduction and Overview

The Certified Cloud Security Specialist (CCSS), a 3-day intensive training program with project work component focuses on cloud computing with respect to its security aspects. CCSS will impart in-depth knowledge with respect to security risks in the context of cloud computing, related issues and solutions. Participants will also gain knowledge about cloud security issues from an architectural design perspective. In addition, this course will cover cloud computing security taxonomies under two categories:

  1. Architectural & technological security taxonomy
  2. Process & governance-related security taxonomy

Further, this course will also impart knowledge about the key concept of Security as a Service (SECaaS) CSA’s Enterprise Architecture with a focus on its SRM (Security and Risk Management), perimeter defense security systems for cloud infrastructure and cloud security administrative best practices. The course will also present relevant industrial case studies to underscore the security issues in the cloud.

Duration

  • 24 Hours (3 Days) Classroom Training

Who Should Attend?

  • Cloud Operations Engineer
  • Cloud Infrastructure Engineer
  • Cloud Services Product Analyst
  • Cloud Software Engineer (Solution/Database)
  • Senior Cloud Operations Engineer
  • Application Support Manager – Cloud
  • Cloud Development Manager
  • Cloud Operations Manager
  • Cloud Services Product Manager
  • Infrastructure Architect – Cloud
  • Integration Architect – Cloud

Pre-Requisite

Participants are expected to have any one of the following certifications to take up this GSTF CCSS certification.

  1. GSTF Certified Cloud Computing Associate (CCCA)
  2. GSTF Certified Cloud Computing Specialist (CCCS)
  3. EXIN Cloud Technologies Advanced

Assessment and Certification

  • Component 1: Written Examination (MCQ)
    • 30 Questions
    • 45 Minutes duration
    • Closed Book
    • Score 65% to pass
  • Component 2: Project Work Component (PWC)
    • Individual work
    • 2 weeks to complete from the last day of course
    • Score 65% to pass
  • Certification
    • Upon passing the course, you will be awarded “Certified Cloud Security Specialist
    • Certification body – Global Science and Technology Forum

Funding

Course Outcome

  • An in-depth understanding of Cloud Computing and its challenges
  • Different perspectives of Cloud Computing from its architectural design
  • Cloud Computing Security Taxonomies
  • Architectural and technological aspects of cloud security taxonomies
  • Process and regulatory-related aspects of cloud security taxonomies
  • Acquire knowledge on Security as a Service (SECaaS)

Course Outline

Cloud Computing, Service Models, Deployment Models & Architecture: A Quick Review

  • Introduction: Cloud Computing
  • Hype Cycle: Cloud
  • Cloud Computing Evolution
  • Definition and Characteristics
  • Benefits of Cloud Computing
  • Cloud Service Models
    • SaaS
    • PaaS
    • IaaS
  • Deployment Models
    • Private Cloud
    • Public Cloud
    • Community Cloud
    • Hybrid Cloud
  • Cloud Architecture

Problems in Cloud Computing

  • Data Integrity
  • Data Theft
  • Privacy Issues
  • Infected Application
  • Data Loss
  • Data Location
  • Security on Vendor Level
  • Security on User Level

Cloud Security – Different Perspectives

  • Cloud User Perspectives
  • Cloud Service Provider Perspectives
  • Cloud security from different service models
  • Cloud Security from different deployment models

Security Perspectives in Cloud Architecture Design

  • Data Centre or Physical Security
  • Server Security
  • Network Security
  • Application and Platform Security
  • Encryption and Key Management
  • Infrastructure Security

Cloud Computing Security Taxonomies

  • Introduction to Cloud Security Taxonomies
  • Need of Cloud Security Taxonomies
  • Types

Taxonomy 1: Architectural & Technological aspects

  • Logical Storage Segregation & Multi-tenancy Issues
  • Identity Management Issues
  • Insiders Attacks
  • Virtualization Issues
  • Cryptography and Key Management

Taxonomy 2: Process & Regulatory-related aspects

  • Governance and Regulatory Compliance Gaps
  • Insecure APIs
  • Cloud & CSP Migration Issues
  • SLA & Trust Management Gaps

Security as a Service (SECaaS)

  • Introduction to Security as a Service
  • Global forecast of Cloud Security
  • Buying criteria recommendations
  • Cloud Security Market Growth Drivers
  • Current market trends and challenges
  • Different area included in SECaaS
  • Advantages
  • Disadvantages

Top Cloud Security Vendors

  • Top Cloud Security Vendors