Formation de préparation à l examen de



Documents pareils
Le Cloud Computing est-il l ennemi de la Sécurité?

COMPUTING. Jeudi 23 juin CLOUD COMPUTING I PRESENTATION

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

Les marchés Security La méthode The markets The approach

ISO/IEC Comparatif entre la version 2013 et la version 2005

Frequently Asked Questions

Application Form/ Formulaire de demande

Cycle de conférences sur Cloud Computinget Virtualisation. Cloud Computing et Sécurité Pascal Sauliere, Architecte, Microsoft France

SCC / QUANTUM Kickoff 2015 Data Protection Best Practices

Cloud Computing: de la technologie à l usage final. Patrick CRASSON Oracle Thomas RULMONT WDC/CloudSphere Thibault van der Auwermeulen Expopolis

Gouvernance et nouvelles règles d organisation

AUDIT COMMITTEE: TERMS OF REFERENCE

RAPID Prenez le contrôle sur vos données

ICT7 Luxembourg. ICT7 Belgium. ICT7 France. 33 people. 12 people. 2 people

Language requirement: Bilingual non-mandatory - Level 222/222. Chosen candidate will be required to undertake second language training.

SHAREPOINT PORTAL SERVER 2013

Qualité et ERP CLOUD & SECURITY (HACKING) Alireza MOKHTARI. 9/12/2014 Cloud & Security

Information Security Management Lifecycle of the supplier s relation

Cloud Computing Foundation Certification Exin

Deadline(s): Assignment: in week 8 of block C Exam: in week 7 (oral exam) and in the exam week (written exam) of block D

Institut français des sciences et technologies des transports, de l aménagement

Instructions Mozilla Thunderbird Page 1

Networking Solutions. Worldwide VSAT Maintenance VSAT dans le Monde Entretien. Satellite Communications Les Communications par Satellite

La gestion des risques IT et l audit

accompagner votre transformation IT vers le Cloud de confiance

LES APPROCHES CONCRÈTES POUR LE DÉPLOIEMENT D INFRASTRUCTURES CLOUD AVEC HDS & VMWARE

Jean-Nicolas Piotrowski, Dirigeant Fondateur d ITrust

Quatre axes au service de la performance et des mutations Four lines serve the performance and changes

L industrie pharmaceutique et la grippe aviaire

Consultants en coûts - Cost Consultants

Paxton. ins Net2 desktop reader USB

ETABLISSEMENT D ENSEIGNEMENT OU ORGANISME DE FORMATION / UNIVERSITY OR COLLEGE:

La diffusion du Registre du Commerce et des Sociétés en France

How to Login to Career Page

Practice Direction. Class Proceedings

CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT

THE OUAGADOUGOU RECOMMENDATIONS INTERNET INFRASTRUCTURE FOR AN AFRICAN DIGITAL ECONOMY 5-7 MARCH 2012

Solutions Dell Networking pour le Big Data. Philippe MARTIN Networking Sales Specialist - p_martin@dell.com

Archived Content. Contenu archivé

Comment démarrer son Cloud Hybrid avec Amazon Web Services

BELAC 1-04 Rev

Stratégie IT : au cœur des enjeux de l entreprise

Tier 1 / Tier 2 relations: Are the roles changing?

APPENDIX 6 BONUS RING FORMAT

APPENDIX 2. Provisions to be included in the contract between the Provider and the. Holder

Développement logiciel pour le Cloud (TLC)

Forthcoming Database

GEIDE MSS /IGSS. The electronic document management system shared by the Luxembourg

SMALL CITY COMMERCE (EL PEQUEÑO COMERCIO DE LAS PEQUEÑAS CIUDADES)

PIB : Définition : mesure de l activité économique réalisée à l échelle d une nation sur une période donnée.

Dans une agence de location immobilière...

FOURNIR UN SERVICE DE BASE DE DONNÉES FLEXIBLE. Database as a Service (DBaaS)

Comprendre l impact de l utilisation des réseaux sociaux en entreprise SYNTHESE DES RESULTATS : EUROPE ET FRANCE

Francoise Lee.

Formulaire de candidature pour les bourses de mobilité internationale niveau Master/ Application Form for International Master Scholarship Programme

Mise en place d un système de cabotage maritime au sud ouest de l Ocean Indien. 10 Septembre 2012

Nouveautés printemps 2013

Statement of the European Council of Medical Orders on telemedicine

Le Cloud: Mythe ou Réalité?

FCM 2015 ANNUAL CONFERENCE AND TRADE SHOW Terms and Conditions for Delegates and Companions Shaw Convention Centre, Edmonton, AB June 5 8, 2015

Contents Windows

Editing and managing Systems engineering processes at Snecma

.Réinventons l innovation.

Public and European Business Law - Droit public et européen des affaires. Master I Law Level

Infrastructure modernization with Microsoft Azure. Vincent Rullier, Account Technology Strategist

VMware : De la Virtualisation. au Cloud Computing

Comprehensive study on Internet related issues / Étude détaillée sur les questions relatives à l Internet. November/Novembre 2014

La Poste choisit l'erp Open Source Compiere

Digitalisation de l Industrie Bancaire

Cedric Dumoulin (C) The Java EE 7 Tutorial

PRESENTATION. CRM Paris - 19/21 rue Hélène Boucher - ZA Chartres Est - Jardins d'entreprises GELLAINVILLE

Cloud Computing, Fondamentaux, Usage et solutions

PLM 2.0 : Mise à niveau et introduction à l'offre version 6 de Dassault systèmes

Accompagner nos clients vers.cloud. Nicolas Luneau Business Development Manager Symantec.cloud

Notice Technique / Technical Manual

Optimiser votre reporting sans déployer BW

IDENTITÉ DE L ÉTUDIANT / APPLICANT INFORMATION

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

1. Formation F5 - Local Traffic Manager Configuring (LTM)

setting the scene: 11dec 14 perspectives on global data and computing e-infrastructure challenges mark asch MENESR/DGRI/SSRI - France

that the child(ren) was/were in need of protection under Part III of the Child and Family Services Act, and the court made an order on

Lieberman Software Corporation

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

Club toulousain

If the corporation is or intends to become a registered charity as defined in the Income Tax Act, a copy of these documents must be sent to:

Extension fonctionnelle d un CRM. CRM étendu >> Conférence-débat 15 April Club Management des Systèmes d Information de l'iae de Paris Alumni

Improving the breakdown of the Central Credit Register data by category of enterprises

Master Développement Durable et Organisations Master s degree in Sustainable Development and Organizations Dossier de candidature Application Form

en SCÈNE RATIONAL Rational Démonstration SDP : automatisation de la chaîne de développement Samira BATAOUCHE sbataouche@fr.ibm.com

ILM ou Archivage Une démarche Métier

Containers : Outils magiques pour les Devops? OpenNebula et son écosystème pour une infrastructure cloud agile

Toni Lazazzera Tmanco is expert partner from Anatole ( and distributes the solution AnatoleTEM

Certified Information System Security Professional (CISSP)

NIMBUS TRAINING. Administration de Citrix NetScaler 10. Déscription : Objectifs. Publics. Durée. Pré-requis. Programme de cette formation

Nombre de reconnaissances et d awards prestigieux concourent à démontrer la réussite de cette stratégie.

NEW POINT-OF-VIEW & DIRECTION

DOCUMENTATION - FRANCAIS... 2

DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0

Gestion des prestations Volontaire

GESTION DU CYCLE DE VIE. Albert Amar Avant-vente Middleware

Transcription:

Formation de préparation à l examen de Certification CCSK en sécurité de l infonuagique La certification CCSK est la plus reconnue en sécurité de l infonuagique. Elle repose sur les meilleures pratiques de la sécurité des technologies de l information dans ce domaine. La formation s adresse à toute personne œuvrant en architecture de réseau, en réseautique, architecture IT et en sécurité de l information. Intelligent Security IT vous offre une formation préparatoire à l examen CCSK à Tunis, une formation pour se préparer à l examen d obtention de la certification Certificate of Cloud Security Knowledge (CCSK) en infonuagique de la Cloud Security Alliance (CSA). Cette formation sera offerte pour la première fois en Tunisie. La session de préparation clé en main inclut le coût et le jeton pour passer ensuite l examen en ligne, au moment qui conviendra au participant. 1. Objectifs de la formation Comment peut-on assurer la sécurité des informations dispersées dans "le nuage"? Ce séminaire dresse un panorama complet de ce problème majeur du Cloud. A l'issue, les participants auront acquis les connaissances essentielles permettant de se présenter au passage de la certification CCSK de la Cloud Security Alliance. L'objectif de la session de formation aussi est de réussir l'examen de certification. Il faut absorber le mode de pensée du CSA afin d'être en mesure de comprendre les questions.

2. Programme de formation: Day 1 : Introduction to Cloud Computing Infrastructure Security for Cloud Introduction and Risk Analysis (practical exercise) Create and Secure a Public Cloud Instance (practical exercise) Evaluation, Q&A Day 2 : Managing Cloud Security and Risk Encrypt an EBS Volume (practical exercise) Data Security for Cloud Create and Secure a Cloud Application (practical exercise) Securing Cloud Users and Applications Evaluation, Q&A Day 3 : Identity and Access Management (practical exercise) Selecting Cloud Services Deploy and Secure a Private Cloud (practical exercise) Review, Evaluation and Test Preparation What you will receive : 3 days of training. All handouts Practical workbook After the course support Quizzes and sample questions 3. Durée de la formation : 3 jours 4. Langue de la formation: Anglais/Français (le support de cours est en Anglais) 5. Type de la formation : Inter Entreprise 6. Lieu de la formation : dans un hôtel 4* a Tunis 7. Formateur : Dr. Peter van Eijk Dr. Peter HJ van Eijk is one of the world s most experienced independent cloud trainers. He is certified by the CSA to deliver CCSK training, and by the Cloud Credential Council to deliver CompTIA Cloud Essentials and Virtualization Essentials. He was the single author of the ITpreneurs Cloud Essentials course, and a contributor to the Virtualization Essentials course. He has delivered these courses dozens of times to hundreds of attendants around the world, including the US, Europe, Middle East, India, and Asia. Peter has more than 30 years of IT experience as a consultant, coach, project leader, researcher and practitioner in the field of cloud computing and other digital infrastructures.

8. Key exam areas and concepts: From the CSA Guidance For Critical Areas of Focus in Cloud Computing V3.0 English : Domain 1: Architecture NIST Definition of Cloud Computing (Essential Characteristics, Cloud Service Models, Cloud Deployment Models) Multi-Tenancy CSA Cloud Reference Model Jericho Cloud Cube Model Cloud Security Reference Model Cloud Service Brokers Domain 2: Governance and Enterprise Risk Management Contractual Security Requirements Enterprise and Information Risk Management Third Party Management Recommendations supply chain examination use of cost savings for cloud Domain 3: Legal issues: Contracts and Electronic Discovery Consideration of cloud-related issues in three dimensions ediscovery considerations Jurisdictions and data locations Liability for activities of subcontractors Due diligence responsibility Federal Rules of Civil Procedure and electronically stored information Metadata Litigation hold Domain 4: Compliance and Audit Management Definition of Compliance Right to audit Compliance impact on cloud contracts Audit scope and compliance scope Compliance analysis requirements Auditor requirements Domain 5: Information Management and Data Security Six phases of the Data Security Lifecycle and their key elements Volume storage Object storage Logical vs physical locations of data Three valid options for protecting data Data Loss Prevention Detection Data Migration to the Cloud Encryption in IaaS, PaaS & SaaS Database Activity Monitoring and File Activity Monitoring Data Backup Data Dispersion Data Fragmentation Domain 6: Interoperability and Portability Definitions of Portability and Interoperability Virtualization impacts on Portability and Interoperability SAML and WS-Security Size of Data Sets Lock-In considerations by IaaS, PaaS & SaaS delivery models Mitigating hardware compatibility issues Domain 7: Traditional Security, Business Continuity, and Disaster Recovery Four D's of perimeter security Cloud backup and disaster recovery services Customer due diligence related to BCM/DR Business Continuity Management/Disaster Recovery due diligence Restoration Plan Physical location of cloud provider

Domain 8: Data Center Operations Relation to Cloud Controls Matrix Queries run by data center operators Technical aspects of a Provider's data center operations customer should understand Logging and report generation in multi-site clouds Domain 9: Incident Response Factor allowing for more efficient and effective containment and recovery in a cloud Main data source for detection and analysis of an incident Investigating and containing an incident in an Infrastructure as a Service environment Reducing the occurrence of application level incidents How often should incident response testing occur Offline analysis of potential incidents Domain 10: Application Security identity, entitlement, and access management (IdEA) SDLC impact and implications Differences in S-P-I models Consideration when performing a remote vulnerability test of a cloudbased application Categories of security monitoring for applications Entitlement matrix Domain 11: Encryption and Key Management Adequate encryption protection of data in the cloud Key management best practices, location of keys, keys per user Relationship to tokenization, masking, anonymization and cloud database controls Domain 12: Identity, Entitlement, and Access Management Relationship between identities and attributes Identity Federation Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP) SAML and WS-Federation Provisioning and authoritative sources Domain 13: Virtualization Security concerns for hypervisor architecture VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps In-Motion VM characteristics that can create a serious complexity for audits How can virtual machine communications bypass network security controls VM attack surfaces Compartmentalization of VMs Domain 14: Security as a Service 10 categories Barriers to developing full confidence in security as a service (SECaaS) When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA Logging and reporting implications How can web security as a service be deployed What measures do Security as a Service providers take to earn the trust of their customers ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security Isolation failure Economic Denial of Service Licensing Risks VM hopping

Five key legal issues common across all scenarios Top security risks in ENISA research OVF Underlying vulnerability in Loss of Governance User provisioning vulnerability Risk concerns of a cloud provider being acquired Security benefits of cloud Risks R.1 R.35 and underlying vulnerabilities Data controller vs data processor definitions in Infrastructure as a Service (IaaS), who is responsible for guest systems monitoring 9. Passage de l Exam The CCSK examination is a timed, multiple choice examination you take online at https://ccsk.cloudsecurityalliance.org. The examination consists of 60 multiple choice questions selected randomly from question pool, and must be completed within 90 minutes. A participant must correctly answer 80% of the questions to receive a passing score. Because the exam is online, it is open book. For candidates that fail the test, there is one retry included in the offer. Test participants will receive two opportunities to pass the test. While you may take your second attempt as soon as you wish, we highly recommend studying the source material again prior to taking the test. Because of question randomization, you may see a very different exam with mostly different questions.

PREPARATION A LA CERTIFICATION CCSK 09, 10 et 11 Novembre 2015 FICHE INSCRIPTION Merci de photocopier, remplir et renvoyer ce bulletin par fax ou par email. Nom et prénom :.... Fonction :.. Email :.... Entreprise :.... Adresse : Téléphone :.. Fax :.... TARIF Formation CCSK: 2 300 DT HT (TVA 12%) Frais d examen : 1 000 DT HT (Les frais d inscription à l examen sont optionnels) Total HT:.. Tunis le, Signature et cachet Conditions générales d inscription Votre inscription sera définitive après réception d une confirmation écrite de votre part, par Bon de Commande (télécopie ou courrier), 15 jours avant le début de la session, où devront figurer le nom des stagiaires, le montant de la commande, les caractéristiques du stage et les adresses de correspondance et de facturation. Elle sera prise en compte dans la limite des places disponibles. Une convocation écrite sera adressée personnellement au stagiaire dès la réception de son inscription. Lieu de la session de Formation: Hôtel 4* à Tunis. Numéro d enregistrement : Tunis : MFPE : 11-1314-14 Calcul des coûts: Les prix incluent : La participation à la formation. Les supports de cours. Les Déjeunes et pauses cafés. Annulation de session: Intelligent Security IT se réserve le droit d annuler une session lorsque le nombre de participants est insuffisant. Annulation d inscription: Tout désistement devra être notifié à Intelligent Security IT au moins deux semaine avant le début de la session. Au delà de ce délai, le montant prévu pour la session vous sera intégralement facturé.