(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 165 - Cloud Computing Security
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 165 | 04 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 165 | 30 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
Cloud security, also known as cloud computing security, is a group of policies, controls, procedures and technologies help keep cloud-based systems, data, and infrastructure safe and secure. In this course, participants will be introduced to concepts such as cloud computing infrastructure, cloud computing rulesand security problems related to cloud computing. Architecture and infrastructures for private, public, institutional and hybrid clouds are also covered. The course also discusses virtualization security, application security and policy and risk assessment for clouds. Contracts and agreements in clouds, grid services and remote security control, SaaS, PaaS, IaaS concepts, security models are among the topics covered as well.
Course Objectives
- Learn about cloud computing concept
- Understand cloud computing architecture
- Introduce security problems in cloud computing
- Give necessary cryptographic background for security solutions
- Discuss and propos e solutions to the cloud specific security problems
Who Should Attend?
- Cyber Security Engineer
- Cloud Security Experts
- Cloud Security Administrator
- Cyber Security Administrators
- Cloud Computing Users
- Anyone interested in the topic and have a basic mathematical backgroud and knowledge
Course Details/Schedule
Day 1
- Cloud computing definition
- Cloud computing history
- Why cloud computing
- Security definition
- Basic security solution tools
- Basic security issues in cloud computing
- Understanding Cloud Computing
- Fundamental Concepts and Models
- Cloud Enabling Technology
- Fundamental Cloud Security
Day 2
- Cloud Infrastructure Mechanisms
- Specialized Cloud Mechanisms
- Cloud Management Mechanisms
- Cloud Security Mechanisms
- Cloud Delivery Models: The Cloud Provider Perspective
- Cloud Delivery Models: The Cloud Consumer Perspective
Day 3
- Introduction to Cryptography
- Some adversary models
- Security definitions
- One Time Pad (OTP)
- Computational security vs Information-theoretic security
- Symmetric key algorithms - Block ciphers, Stream ciphers, DES, 3DES, AES,
- Hash Functions, Birhday Paradox
Day 4
- Public Key Algorithms
- Diffie Hellman Key Exchange Algorithm
- DLP Problem
- RSA
- Factorization Problem
- Number Theory Review
- El-Gamal
- Introduction to Elliptic Curve Cryptography
Day 5
- Cryptographic Protocols & Applications
- Zero Knowledge proof (ZK proof)
- Commitments
- Secret sharing
- Private information retrieval (PIR)
- Homomorphic encryption
- Searchable encryption
- Convergent encryption