Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloud-based services, and you will build the knowledge to identify appropriate on-premise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“The challenge when thinking about cloud security controls isn’t the idea that they don’t exist. The problem is that cloud security controls are very different from on-premise controls, and teams have to get used to what that means.”
This targeted cybersecurity course is suited for management-level professionals whose organizations use cloud-based services to conduct any portion of their business. Upon completion, you will possess a detailed understanding of the intricacies of security programs in cloud environments and be able to strategically enact the appropriate measures to protect your company’s digital assets.
Module 1: Translating Existing Security Controls to a Cloud Environment
Identify appropriate on-premises security controls that should be present in cloud environments. Identify applicable security controls in cloud environments. Apply appropriate security controls in cloud environments. Identify key similarities and differences between on-premises systems and cloud-based services.
Module 2: Building Policies and Identifying Process Owners
Explain the key information needed to create an effective policy. Implement management structure so that policies are enforced and stakeholders understand their roles. Identify strategies for socializing policies to ensure knowledge and compliance.
Module 3: Design and Architecture That Safeguard Data
Identify cloud design elements and requirements for safeguarding data. Explain the importance of threat modeling to identify possible vulnerabilities in a cloud environment. Develop a plan to document and socialize reference architecture.
Module 4: Ongoing Monitoring and Audit
Develop a protocol for monitoring your cloud instances. Discuss tools for security auditing. Apply what you know about cloud security to assess threat vulnerability.
Healthcare Informatics Foundations and Frameworks
Now, more than ever, the healthcare industry needs professionals who can use emerging technology to optimize healthcare delivery and improve outcomes. Healthcare Informatics...
Healthcare Analytics Foundations and Frameworks
What does it look like when data is used for good? In this new era of healthcare, we’re all relying on...
Machine Learning Cases
This is your chance to learn from the successes and failures of others to build your machine learning skillset. Rooted in real cases, this course...
Building a Red Team Capability
Can a friendly company hacker exist? A growing number of companies see the advantage not only in simulated attacks but in indirectly testing...
Building a Threat Hunting Capability
Turn your defense into offense with Building a Threat Hunting Capability, a course designed to explore the options available...
Want to emulate the success of blockchain games like CryptoKitties and avoid the failures of initiatives like the DAO? Blockchain Cases teaches you...
Blockchain and Industry
You have a brilliant idea for how blockchain can benefit your company, but how do you put it into practice? Blockchain and Industry...
Machine Learning and Industry
Even if you have an idea for a machine learning solution that could transform your company, implementing it is a whole different challenge. Machine Learning...
Cyber Threat Intelligence
Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains...
What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches...
Cybersecurity Risks and Industry
You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? Cybersecurity Risks...
Machine Learning Foundations and Frameworks
The big data revolution is underway. Are you ready to embrace the machine learning innovations that can lead your company to the top? Machine Learning...
Cybersecurity Foundations and Frameworks
In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks teaches you...
Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security...
Blockchain Foundations and Frameworks
By now, you’ve heard about blockchain. But do you know exactly what it is, or how it can take your business to the...
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.