(314) 504-0530 info@bac-mail.com

Essentials of Cloud Computing: Security, Audit & Control

  • CPE Credits: 8
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group Live
  • Field of Study: Information Technology – Technical
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
We can argue that it is not a matter of whether cloud computing will become ubiquitous—because the economic forces are inescapable—but rather what can we do to assess enterprise governance, risk assessment and development of strong internal controls, in the implementation and management of ever increasing cloud computing environments.

This new training program will begin by first establishing the definition of cloud computing, then describing the various service delivery models of a cloud computing architecture, and the ways in which clouds can be deployed as public, private, hybrid, and community clouds, followed by a much deeper review of the security and privacy issues related to cloud computing environments.

We will examine cloud computing models, look into the threat model and security issues related to data and computation outsourcing, and explore practical applications of secure cloud computing. Using the confidentiality, integrity, and availability of data (CIA) model we will examine the threats and security implications to befall poorly established and maintained cloud computing environment. Audit approaches and methodologies for assessing internal control exposures within cloud computing environments will also be fully discussed and examined.

Audience
This course is intended for internal and external auditors (IT, financial, operational), and persons charged with establishing or reviewing the implications of establishing strategies that embrace cloud computing, as well as professionals who generally want to learn more about cloud computing and assessing their organization’s implementation of cloud computing technologies.
Objectives
After completing this seminar, participants will be able to:

  1. Discuss, with confidence, what is cloud computing and what are key security and control considerations within cloud computing environments.
  2. Identify various cloud services.
  3. Assess cloud characteristics and service attributes, for compliance with enterprise objectives.
  4. Explain the four primary cloud category “types”.
  5. Evaluate various cloud delivery models.
  6. Contrast the risks and benefits of implementing cloud computing.
  7. Specify security threat exposure within a cloud computing infrastructure.
  8. Recognize steps and processes used to perform an audit assessment of a cloud computing environment.
  9. Summarize specific environments that would benefit from implementing cloud computing, contrasted against those environments that might not benefit.
  10. Weight the impact of improperly controlled cloud computing environments on organizational sustainability.
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

2 + 6 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.