Secure Cloud Adoption gives you a high level insight into cloud and cloud security.
Contains all slides and exercises from my highly regarded Cloud Security Workshop.
Understand How To Get More And Quicker Benefit From Cloud Computing In Your Company With Less Risk
- Learn why cloud computing is here to stay
- Understand how cloud characteristics drive business value and risk
- Identify the important steps in any cloud adoption process
- Understand the most essential technology and cloud architecture components
- Recognize which services are more valuable and less risky
- Bring all the steps together in your plan
- Overcome resistance to cloud initiatives
- Learn how to temper overly enthusiastic people
Your Instructor
I am one of the most experienced independent IT security and cloud trainers worldwide. Since 2011 I am focussed on developing and delivering training, mainly related to business value and business risk of cloud computing, but also in Zero Trust, governance, audit and Artificial Intelligence.
My background is broad. I worked as a researcher and instructor at Twente University, as a project leader and consultant at EDS and an internet provider, and as an IT strategy, IT risk and digital infrastructures consultant at Deloitte.
I have done strategy and implementation projects at small and large organisations and public sector, across the world.
In the past years I had an additional position as associate professor of cyber security and cloud.
Course Curriculum
-
StartIntroduction and scope
-
StartCloud Models
-
StartBusiness benefits
-
StartThreat modelling
-
StartShared responsibilities
-
StartShared responsibilities exercise
-
StartSecuring cloud platforms
-
StartCloud Provider Evaluation
-
StartSecuring cloud workloads
-
StartSecurity Scaling
-
StartFree access to "Understanding CCSK"
-
StartWhat's next?