Course Curriculum

(W00) Course Instructions 00:00:00
Module 1
(W27M01) Module 1 Introduction 00:00:00
(W27M02) Additional Resources 00:00:00
(W27M03) Approaches necessary in evaluating cloud systems with effective forensics - resources 00:00:00
(W27A01) Module 1 Exercise 30, 00:00
Module 2
(W27M05) Module 2: Architecture of the cloud 00:00:00
(W27M06) Architecture of the cloud - continued 00:00:00
(W27M07) Guidance and Recommendations 00:00:00
(W27A02) Exercise on Cloud Architecture 30, 00:00
Module 3
(W27M09) Trusted computing - Module Notes 00:00:00
(W27M10) Trusted cloud modelling - readings 00:00:00
(W27M11) Reading: The Clark-Wilson Security Model - reading 00:00:00
(W27M12) Brewer and Nash Model - reading 00:00:00
(W27A03) Exercise on trusted computing 30, 00:00
Module 4
(W27M14) Module 4 notes - Security in the cloud 00:00:00
(W27M15) Security and testing in the cloud - Reading 00:00:00
(W27A04) Exercise on cloud security 30, 00:00
Module 5
(W27M17) Module 5 Notes 00:00:00
(W27M18) Module 5 Reading 00:00:00
(W27M19) Selected recommendations from the Clouse Security Alliance (CSA) 00:00:00
(W27M20) Course Summary 00:00:00
Final Exam
(W27Q01) Final Test 00:20:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023