Training Academy
The CSA APAC Training Academy aims to create and offer educational programmes to enrich both enterprise and individual users on different areas of cloud security based on the 14 domains in the CSA Security Guidance.
|
For auditor training, the CCM, which addresses issues in compliance, audit and governance, would be the ideal course since it is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in accessing the overall security risk of a cloud provider.
To make a start, you can look into the Certificate of Cloud Security Knowledge (CCSK), which is an examination testing for a broad foundation of knowledge about cloud security, with topics ranging from architecture, governance, compliance, operations, encryption, virtualization and much more. Professionals who are interested in boosting his/her qualification can consider taking the CCSP credential, which is designed for experienced information security professionals.
To make a start, you can look into the Certificate of Cloud Security Knowledge (CCSK), which is an examination testing for a broad foundation of knowledge about cloud security, with topics ranging from architecture, governance, compliance, operations, encryption, virtualization and much more. Professionals who are interested in boosting his/her qualification can consider taking the CCSP credential, which is designed for experienced information security professionals.
Identity, Entitlement and Access Management in Cloud Services, Domain 12 in the CSA Security Guidance, is one of the foremost and critical areas in Cyber Security today. Together with material adopted from Domain 10: Application Security, this set of workshops is designed to give you hands-on experience with the configuration and testing of a variety of leading-edge systems used in Cloud Service operations. This will involve using equipement for identity and access control visa smartcards, multifactor authentication, protection against mobile security threats and penetration testing - all of which are essential for the secure operation of cloud services. The primary focus for this set of workshops will be to use the equipment (both hardware and software) to build real cloud-based security systems.
Tired of lecture-based trainings and can't spend too much time out of your office? Here we are, offering you 3 hands-on courses with full commercial implementations, at extremely affordable rates, getting you trained in the shortest amount of time! In order to provide sufficient guidance and instruction, this set of workshops will be limited to only 12 delegates.
Click for more information now.
Tired of lecture-based trainings and can't spend too much time out of your office? Here we are, offering you 3 hands-on courses with full commercial implementations, at extremely affordable rates, getting you trained in the shortest amount of time! In order to provide sufficient guidance and instruction, this set of workshops will be limited to only 12 delegates.
Click for more information now.