Course Objectives
By the end of the course, participants will be able to:
- Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
- Explain cloud structure, properties and management services
- Set a cloud adoption strategy
- Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
- Analyze the major risks associated with the different cloud services and deployment models
- Discuss the main principles, mechanisms and best practices for treating cloud risks
- Demonstrate the discussed concepts using practical case studies, business models and industrial tools
Target Audience
IT and infrastructure leaders, decision-makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers
Target Competencies
- Cloud management
- Identity management
- Access management
- Security risks management