Accredited Africa Training Institute for Capacity Development

Providing accredited training courses in South Africa
  • Accredited Africa Training Institute for Capacity Development Image 3

Cloud Management and Security: Principles and Best Practice

Why Attend

Cloud computing is a new concept using old technologies. It has quickly become a vital tool in organizations across all industries as an Internet-scale computing infrastructure. Nevertheless, despite Cloud computing’s increasing relevance and popularity, there is a lack of understanding of the security risks associated with Clouds and optimal approaches for migration into Clouds. This course covers these from a practical angle; specifically, it covers Cloud computing architecture, management services, and security challenges. It also discusses Cloud migration planning and the main requirements to move current Cloud entrusted infrastructure to a trustworthy Internet-scale Cloud critical computing infrastructure.

Course Methodology

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that allow all participants to use the knowledge they gained to demonstrate their skills in cloud management and security.

Course Objectives

By the end of the course, participants will be able to:

  • Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
  • Explain cloud structure, properties and management services
  • Set a cloud adoption strategy
  • Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
  • Analyze the major risks associated with the different cloud services and deployment models
  • Discuss the main principles, mechanisms and best practices for treating cloud risks
  • Demonstrate the discussed concepts using practical case studies, business models and industrial tools

Target Audience

IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers

Target Competencies

  • Cloud management
  • Identity management
  • Access management
  • Security risks management

Location:

South Africa

Training Dates:

Each course starts every Monday of each week. Please book your training on a date that is a Monday.

Course Duration:

Unit Standard:

NQF Level:

Number of Credits:


Course Fees

Note: Please fill in the online application form on the left or bottom if this page to receive a quotation with detailed pricing from AATICD.

How to Apply:

To Apply Simply Fill in the Online Enquiries / Applications form on the Right Sidebar or Bottom of this website https://www.aaticd.co.za

NB: Terms and Conditions for Payment and Refunds

1.1. Full payment for the training workshop must be made at least 5 days before the scheduled workshop date.

1.2. Payment can be made via bank transfer, credit card, or any other agreed-upon method.

1.3. A confirmation of payment will be issued upon receipt of funds.

1.4. Any form of Payment means that trainee / delegate / client receiving the training accepts the training and agrees to these terms and conditions.

2. Cancellation and Refund Policy

2.1. Cancellations made 30 days or more before the workshop date will be eligible for a full refund, minus any administrative fees.

2.2. Cancellations made 15 to 29 days before the workshop date will be eligible for a 50% refund of the total payment.

2.3. Cancellations made less than 14 days before the workshop date will not be eligible for a refund.

2.4. Participants who fail to attend the workshop without prior notice will not be eligible for a refund.

3. Rescheduling

3.1. If a participant wishes to reschedule, a request must be submitted at least 14 days in advance, subject to availability.

3.2. A rescheduling fee may apply.

4. Workshop Cancellation by the Organizer

4.1. AATICD reserves the right to cancel or reschedule the workshop due to unforeseen circumstances, including but not limited to low enrolment, trainer unavailability, or force majeure events.

4.2. In the event of cancellation by AATICD, participants will be offered a full refund or the option to attend a rescheduled session.

4.3. AATICD is not responsible for any additional costs incurred by participants, such as travel or accommodation expenses.

5. Refund Processing

5.1. Approved refunds will be processed within 7 business days from the date of cancellation approval.

5.2. Refunds will be issued using the original payment method unless otherwise agreed.

6. Contact Information

For any questions regarding payments and refunds, please contact us at:

Email: apply@aaticd.co.za

Phone: +27 73 016 5042

By registering for the workshop, participants agree to abide by these terms and conditions.

In-House Trainings are also available for 3 or more delegates for any duration. Please consult with our Administration for such In-House training bookings.


Course Outline

  • Cloud overview
    • Cloud definition, misconceptions and evolution
    • Cloud services and deployment types
    • Challenges
  • Cloud management
    • Cloud structure and its properties
    • Virtual and application layer management services
    • Cloud dynamic nature and its challenges
    • Application development and integration within clouds
    • Security best practices for automating cloud infrastructure management
    • Clarifying the concepts using industrial platforms
  • Establishing trust in clouds
    • Defining cloud trustworthiness
    • Its properties
    • Assessing cloud trustworthiness
    • Establishing trust in:
      • Private
      • Hybrid
      • Community
      • Public cloud deployment types
    • Establishing trust in:
      • IaaS (Infrastructure as a Service)
      • PaaS (Platform as a Service)
      • SaaS (Software as a Service)
    • Clarifying the concepts using openstack management platform
  • Identity and access management
    • Authentication
    • Authorization
    • Access management
    • Federated access management
    • Insiders vs attackers
    • Insiders analysis and management
    • Related industrial tools:
      • Cloud insider treatments
      • Cloud strong authentication
  • Provenance in clouds
    • Definition and attributes
    • Challenges faced
    • Security risks mitigation using provenance
    • Case studies for using provenance:
      • Forensic investigation
      • Trustworthy operational management
      • Proactive and predictive management
      • Bill assurance
    • Related industrial tools

Chat to us
Scroll to Top