Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Secure Cloud Adoption Essentials
Introduction
Overview of the Secure Cloud Adoption Essentials course
Meet your instructor (2:06)
You and your learning objective?
Cloud Security Focus Workshop: Process
Introduction to the secure cloud adoption process
Process suggestions from the CSA Guidance
The CSA repeatable process model
8 step roadmap
BYO: what steps are important in your experience?
Workshop materials
Introduction and scope
Cloud Models
Business benefits
Threat modelling
Shared responsibilities
Shared responsibilities exercise
Securing cloud platforms
Cloud Provider Evaluation
Securing cloud workloads
Security Scaling
Free access to "Understanding CCSK"
What's next?
1. Why cloud?
Learn how cloud computing is the logical next step in the IT market (17:47)
An example of the IT supply chain (3:55)
2. What is cloud?
Understand the essential cloud characteristics - video (11:23)
Cloud characteristics - slides
Practical demo: Getting started on AWS (8:46)
OpenStack demo (4:43)
Worksheet characteristics
Worksheet characteristics - answer key
Cloud service models - slides
Cloud Service model game
Private cloud
3. How? Roadmaps and Maturity
Learn how the cloud characteristics lead to value and risk - video (2:24)
Cloud business value - slides
Worksheet business value
Agile, Devops and Cloud
Cloud Roadmap - overview (7:28)
Apply: worksheet on value and obstacles
4. Service and Service Chains
Service design and promise theory
Worksheet service elements
Business models and brokers in the supply chain
The customer's customer
4 (extra). Service Engineering
Learn the key elements of services (4:02)
How is cloud procurement different? (1:07)
5. Strategic choices
Cloud Service model
Compare sourcing approaches
6. Technology and Risk
The three top technology components in cloud computing (4:54)
The 5 elements of cloud security (5:11)
Cloud infrastructure
Federated Identity Management
Scalable SaaS
IT risk basics
(extra) More resources
Understand the CCSK Cloud Security Certification (2:45)
How to talk to the board about security (6:04)
Understand the role of the Cloud Control Matrix (6:17)
Cloud Process Model
Teach online with
Securing cloud platforms
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock