MGT520: OnDemand

Provided by

Enquire about this course

What You Will Learn

Building and Leading a Cloud Security Program

Cloud adoption is popular across all types of industry, and many organizations are taking strategic advantage of the cost and speed benefits of transitioning to the cloud. Organizations are migrating mission-critical workloads and sensitive data to private and public cloud solutions. However, an organization 's cloud transition requires numerous key decisions.

This course focuses on what managers, directors, and security leaders need to know to develop their cloud security roadmap, to manage the implementation of cloud security capabilities, as well as how to operate the cloud environment post-transition. Making the right security decisions when adopting the cloud requires understanding the technology, process, and people related to the cloud environment. This complements traditional IT management techniques that managers are accustomed to and helps with making the appropriate informed decisions. We will cover the key objectives of security controls in the cloud environment, including planning, deploying, and running the environment from the starting point to a progressively more mature state. There will be a focus on locking down the environment, securing the data, maintaining compliance, enhancing security visibility to the operations, and managing the security response on a continuous basis. Students will learn the essentials to lead the security effort for the cloud transition journey.

"This type of training, ie: cloud security from a management perspective, is rare and the quality of this one is definitely amazing." - Benoit Ramillion, UEFA

BUSINESS TAKEAWAYS:
  • Establish cloud security program supporting the fast pace business transformation
  • Make informed decisions on cloud security program
  • Anticipate the security capabilities and guardrails to build for the securing the cloud environment
  • Safeguard the enterprise data as workloads are migrated to the cloud
SKILLS LEARNED:
  • Define a strategy for securing a workload in the cloud for medium-size and large enterprises that can support their business objectives
  • Establish a security roadmap based on the security strategy that can support a fast-paced cloud adoption and migration path while maintaining a high degree of security assurance
  • Understand the security basics of the cloud environment across different types of service offerings, then explain and justify to other stakeholders the decisions within the security roadmap
  • Build an effective plan to mature a cloud security posture over time, leveraging security capabilities offered by cloud providers to leapfrog in security capabilities
  • Explain the security vision of the organization in the Cloud domain to your Board Directors and executives, collaborate with your peers, and engage your workforce, driving the security culture change required for the cloud transformation
HANDS-ON TRAINING:

MGT520 uses case scenarios, group discussions, team-based security leadership simulations with embedded real life technical components to help students absorb both technical and management topics. About 60 minutes per day is dedicated to these learning experiences using the Cyber42 leadership simulation game. This web application based game is a continuous exercise where students play to improve security culture, manage budget and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.
  • Section 1: Secure Roadmap Development, Migration Preparation, Security IaaS Environment, IAM Secure Setup
  • Section 2: Container Security, Logging and Monitoring, Encryption in Cloud
  • Section 3: Application Secrets Management, Security Benchmarking, Security Metrics
"Love "seeing' the cloud." - Ivan Clatanoff, CME Group

"Loved the labs, really helps emphasize what we are learning." - Jana Laney

"Team is collaborative. We are all able to bounce ideas of each other comfortably and using AWS to get hands on makes it feel more real than if we were answering questions on a quiz." - Richard Sanders, Best Western International

SYLLABUS SUMMARY:
  • Section 1: Cloud security program and securing identity & access management.
  • Section 2: Security guardrails and Cloud security capabilities adoption
  • Section 3: Maturity security state in cloud and securing workloads
NOTE: This course will have limited overlap with the SANS SEC488: Cloud Security Essentials course because it will provide foundational information on cloud services and cloud security to ensure that students are on the same page. This course focuses on what managers, directors, and security leaders need to know about developing their cloud security plan/roadmap and managing implementation of cloud security capabilities.

WHAT YOU WILL RECEIVE:
  • Printed and Electronic courseware
  • MP3 audio files of the course
  • Digital download package with VM
WHAT COMES NEXT:
  • MGT516: Managing Security Vulnerabilities: Enterprise & Cloud
  • SEC557: Continuous Automation for Enterprise and Cloud Compliance

Enquire

Start date Location / delivery
No fixed date Virtual Book now

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...