Request InformationCybersecurity Discipline:Cloud Security
Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloud-based services, and you will build the knowledge to identify appropriate on-premise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.Length
Installment payments are now available on all course purchases!
Knowledge AreasCloud-based cybersecurity systemsCommon cloud vendorsCloud asset monitoringCloud deploymentThird-party cybersecurity toolsInvestigating a cloud-based breachData privacy and regulatory compliance
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“The challenge when thinking about cloud security controls isn’t the idea that they don’t exist. The problem is that cloud security controls are very different from on-premise controls, and teams have to get used to what that means.”
This targeted cybersecurity course is suited for management-level professionals whose organizations use cloud-based services to conduct any portion of their business. Upon completion, you will possess a detailed understanding of the intricacies of security programs in cloud environments and be able to strategically enact the appropriate measures to protect your company’s digital assets.
Module 1: Translating Existing Security Controls to a Cloud Environment
Identify appropriate on-premises security controls that should be present in cloud environments. Identify applicable security controls in cloud environments. Apply appropriate security controls in cloud environments. Identify key similarities and differences between on-premises systems and cloud-based services.
Module 2: Building Policies and Identifying Process Owners
Explain the key information needed to create an effective policy. Implement management structure so that policies are enforced and stakeholders understand their roles. Identify strategies for socializing policies to ensure knowledge and compliance.
Module 3: Design and Architecture That Safeguard Data
Identify cloud design elements and requirements for safeguarding data. Explain the importance of threat modeling to identify possible vulnerabilities in a cloud environment. Develop a plan to document and socialize reference architecture.
Module 4: Ongoing Monitoring and Audit
Develop a protocol for monitoring your cloud instances. Discuss tools for security auditing. Apply what you know about cloud security to assess threat vulnerability.
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.