Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloud-based services, and you will build the knowledge to identify appropriate on-premise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“The challenge when thinking about cloud security controls isn’t the idea that they don’t exist. The problem is that cloud security controls are very different from on-premise controls, and teams have to get used to what that means.”
This targeted cybersecurity course is suited for management-level professionals whose organizations use cloud-based services to conduct any portion of their business. Upon completion, you will possess a detailed understanding of the intricacies of security programs in cloud environments and be able to strategically enact the appropriate measures to protect your company’s digital assets.
Module 1: Translating Existing Security Controls to a Cloud Environment
Identify appropriate on-premises security controls that should be present in cloud environments. Identify applicable security controls in cloud environments. Apply appropriate security controls in cloud environments. Identify key similarities and differences between on-premises systems and cloud-based services.
Module 2: Building Policies and Identifying Process Owners
Explain the key information needed to create an effective policy. Implement management structure so that policies are enforced and stakeholders understand their roles. Identify strategies for socializing policies to ensure knowledge and compliance.
Module 3: Design and Architecture That Safeguard Data
Identify cloud design elements and requirements for safeguarding data. Explain the importance of threat modeling to identify possible vulnerabilities in a cloud environment. Develop a plan to document and socialize reference architecture.
Module 4: Ongoing Monitoring and Audit
Develop a protocol for monitoring your cloud instances. Discuss tools for security auditing. Apply what you know about cloud security to assess threat vulnerability.
Network Traffic Analysis
This Mandiant course provides hands-on, tactical experience with network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Reinforce technical concepts through Live Lab Sessions,...
Machine Learning Foundations and Frameworks
The big data revolution is underway. Are you ready to embrace the machine learning innovations that can lead your company to the top? Machine Learning Foundations and Frameworks provides essential...
Machine Learning Cases
This is your chance to learn from the successes and failures of others to build your machine learning skillset. Rooted in real cases, this course provides an opportunity for you...
Machine Learning and Industry
Even if you have an idea for a machine learning solution that could transform your company, implementing it is a whole different challenge. Machine Learning and Industry trains...
Cybersecurity Risks and Industry
You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? Cybersecurity Risks and Industry teaches...
Cybersecurity Foundations and Frameworks
In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks teaches you to assess where...
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.