Training

 

 

Popular Courses

Browse Our Free Resources

  • whitepapers
  • whitepapers
  • webinars
  • blogs

Our Locations

Training Centres

Vancouver, BC
Calgary, AB
Edmonton, AB
Toronto, ON
Ottawa, ON
Montreal, QC
Hunt Valley
Columbia

locations map

Calgary

550 6th Av SW
Suite 475
Calgary, AB
T2P 0S2

Toronto

821A Bloor Street West
Toronto, ON
M6G 1M1

Vancouver

409 Granville St
Suite 902
Vancouver, BC
V6C 1T2

U.S. Office

436 York Road
Suite 1
Jenkintown, PA
19046

Other Locations

Dallas, TX
Miami, FL

Home > Training > Cloud Computing > Professional Cloud Security Manager Training

Professional Cloud Security Manager Training

Course#: TP2434

The challenge for professionals in security and governance in IT is in understanding the risks, issues and trade-offs presented by cloud computing.
The emergence of cloud computing has changed both the location and the domain of control of information technology. As on-premise hardware and software, and personal and corporate data are moved off-premise to a cloud or within the premises as a private cloud, the result is a change in ownership and responsibility for the systems, data and services. Current security and legal threats are shifting and new potential threats are being created.
This course is concerned with applying security and governance best practice to a cloud environment. It draws on security guidelines such as CSA and examines the key security issues of cloud computing and what types of business, commercial and technical governance are needed when managing cloud computing security.

Objectives

  • Explains the key security concepts relevant to cloud computing.
  • Shows the impact of cloud security on existing legacy data, systems and business.
  • Analyzes the costs, trade-offs and consequences of severity of those risks relative to the types of cloud computing scenarios in XaaS.
  • Explains the potential types of security risk in cloud computing.
  • Shows the risks of various cyber-attacks on data held in cloud environments.
  • Differentiates the transparency, accountability and viability in relation to cloud computing.
  • Shows the critical physical security threats associated with data held in cloud environments.
  • Distinguishes between ownership and access issues in both on-premise and off-premise hardware.
  • Shows the critical virtual security threats associated with data held in cloud environments.
  • Distinguishes between the issues specific to corporate and non-corporate resources and environments.
  • Demonstrates compliance and audit provisions relevant to operating in the cloud.
  • Analyzes the balance of responsibility and liability between client and service provider in a given scenario.
  • Relates the implications of core cloud features on security and governance.
  • Illustrates the impact of cloud computing on legal issues, such as copyright, legislative compliance and ownership.
  • Explains the key current security standards that apply to cloud computing
  • Analyzes the security issues and risks in a given scenario.
  • Summarizes the design features that are required for a secure cloud environment.
  • Analyzes the various security management components and tools currently available.
  • Explains the core principles of governance in a cloud environment.
  • Explains the key concepts and issues of systems and business monitoring for on premise and off premise, remote services monitoring scenarios 
  • Analyzes the pros and cons of different monitoring systems in relation to the various cloud deployment possibilities.
  • Outlines the types of tools for User and systems monitoring using scenarios for on premise, off premise and hybrid combinations
  • Explains  the key concepts and types of contracts for technology and business and the imp[act of cloud on contracts management
  • Explains the different hosting models ranging from onsite, CoLoc, Outsourcing, Managed hosting, Cloud Managed Hosting and  the impact of cloud computing on these models.
  • Explains the different contract options for the different cloud deployments, the use of contract templates and types of contract between single and multiple parties 
  • Relates the different types of monetization, metering and charging and subscription mechanisms and the impact on Terms and Conditions of service for different types of cloud computing scenarios  
  • Summarizes the key legislative control issues that apply to cloud computing environments.
  • Explains the key IaaS security issues and systems with example case studies
  • Analyzes appropriate security strategies for the planning, building, testing and management of an IaaS cloud environment using scenarios with case studies
  • Explains the key encryption systems for different types of cloud deployment and use.
  • Shows the different types of Digital Rights and protection issues and potential  tools and methods for Intellectual property, copy right and related to SLA contract compliance monitoring
  • Outlines the types of tools for digital policy assurance of usage from consumer, provider and intermediary perspectives and case study scenarios
  • Relates the security issues in different types of network.
  • Explains the essential provisions of disaster recovery and business continuity planning in a cloud deployment
  • Analyzes the different types of DR, BC planning solutions using cloud computing scenarios in case studies.
  • Outlines for disaster recovery in a given case study scenario.
  • Explains the range of tools and automation methods relating to Security Management and the Security Reference Architecture and Policy standards
  • Compares the differing security automation options according to the consumer, provider and intermediary perspectives using cloud computing scenarios with case studies.
  • Explains the key PaaS security issues and systems with example case studies
  • Analyzes appropriate security strategies for the planning, building, testing and management of an PaaS cloud environment using scenarios with case studies
  • Distinguishes version management issues and how they apply to each main cloud deployment model.
  • Explains the key SaaS security issues and systems with example case studies
  • Analyzes appropriate security strategies for the planning, building, testing and management of an SaaS cloud environment using scenarios with case studies
  • Shows the key identity management issues in cloud computing.
  • Illustrates the placement of active directory controls in a given firewall scenario.
  • Summarizes the significant authentication and authorization issues.
  • Analyzes the different options for single sign on in different cloud architectures.
  • Compares the practical implications for cloud management of the various audit and assurance standards.

Audience

  • Cloud Security Managers

Duration

3 Days

Outline of TP2434 Professional Cloud Security Manager Training

Module 1. Security and Governance Concepts in Cloud Computing

The aim of this module is to explore the concept of risk and the impact of cloud computing so that the candidate is aware of the underpinning security concepts in a cloud environment.
Risk and the impact of cloud computing must be understood in terms of both business and technical security challenges and their effect on business and technical governance and policy. What kinds of terminology are used to describe security threats and issues and in particular those in cloud computing?

Key Topics

  • Understanding risk, security and governance
  • What do we mean by security and governance?
  • What is risk?
  • How do we evaluate risk and vulnerability?
  • What are the costs associated with risk?
  • Defining security and the types of security and risk
  • Security is about- "locks and doors"
  • Governance is about - "Policies and Procedures"
  • Security is about access
  • Governance is about behavior
  • Assessing Security Risks in Cloud
    • Lay out the types of issues to consider.
    • Defining the evaluation of risk. Types of severity and impact assessment.
  • Assessing Cost of Security
    • Identifying the key costs of security and the impact of cloud
    • Identifying examples of cost of cloud security
    • Cost of replacing
    • Cost of lost opportunity  e.g. cloud platform goes down and hosted companies lose IT service for a period
    • Reputational cost  e.g. portable device is lost and data is stolen e.g. can you remotely shut done a lost device
    • Identity theft cost

Module 2. Security Threats and Challenges in Cloud Computing

The aim of this module is to examine the need to test the compliance and certification of a cloud environment and its services so that the candidate can confidently address likely security challenges.
The security needs of consumers and providers and those responsible for trading standards and government policy are impacted by the changes in cloud computing business models and usage. What different types of security challenges are there and how do these change in a cloud scenario? How are transparency, accountability and viability defined and accessed in cloud computing?

Key Topics

  • Types of security and compliance issues in cloud 
  • Look at the familiar types of security issues and how cloud changes those.
  • What is it about cloud that is specific to security issues?
  • What is at risk in private, public, hybrid and community clouds?
  • What are the risks exposed by SaaS, PaaS and IaaS?
  • What kinds of compliance and certification is needed
  • What are the types of security issues that exist regardless of whether it is a cloud or not?
  • Examples of cyber attack
    • Denial Of Service (DOS) attack 
  • Transparency, accountability and viability
    • Accountability of service risk and security
    • Stack of different providers offering different parts of the cloud service end to end
    • Multiple XaaS providers correspondingly multiply security access points. 
    • How do remediation, rollbacks and compensation work?
    • Trade-off of risk and scope
    • How does it impact the SLA?  It is an obligation risk versus opportunity risk?
  • Understanding perception and reality of current security risk and status versus cloud security risk

Module 3. Physical Security and the Impact of Cloud Computing

The aim of this module is to highlight physical security issues that may apply to cloud environments so that the candidate can apply that awareness to their specific cloud computing role.
Physical security issues can apply to on-premise and off-premise devices, hardware, software and services. There are also different risks associated with corporate and non-corporate devices and their connection to company or public cloud services and networks. 

Key Topics

  • On-premise versus off-premise hardware
  • The following topics are discussed:
  • Network connection
  • Topology
  • Remote
  • Distributed
  • Tablets and devices
  • BYOD  (Bring your Own Device)
  • Devices outside your corporate firewall
  • You don’t own everything in the stack anymore, so you don’t control it
  • Different monitoring controls
  • Account management

Module 4. Virtualization Management and Security in the Cloud

The aim of this module is to explore the virtual security issues that apply to cloud environments so that the candidate can apply that awareness to their specific cloud computing role.
Virtual security issues can apply to on-premise and off-premise devices, hardware, software and services. This can also include corporate and non-corporate resources and environments that may be virtualized, for example the management of security access controls to virtual partitions of cloud resources and services that include virtual containers, storage, databases, networks, applications and data.  

Key Topics

Module 5. What Security does the Cloud Solve or Shift?

The aim of this module is to discuss what the cloud might solve or shift in relation to security so that the candidate understands the specific impact of cloud computing on data and system security.
With more service providers integrated into operations, there is more reliance on the viability of other companies for operational running.  This increases vulnerability, and therefore becomes a security issue. The key question is under what circumstances does the responsibility for security and compliance shift to the service provider.

Key Topics

  • Cost effective data centre security
  • Improved security expertise at the centre
  • Improved security patching and monitoring
  • Increased resilience
  • Business agility vs. vendor lock-in; lock-in, lock-out and solution agility
  • Assessing business and IT environments for security risks
  • Company change and advantages of cloud. Choosing the right cloud solutions
  • Ability to change / modify solutions
  • Portability of data and system solutions
  • Cost of swap versus change
  • Speed and cost of adoption and migration
  • Business continuity
  • Buying a generator vs. paying a utility
  • Recovery (RTO, RPO)

Module 6. What Security Does Cloud Change or Introduce?

The aim of this module is to explore the “delta” of the cloud from a security perspective so that the candidate can apply that awareness to their specific cloud computing role.
The nature of cloud computing forces changes on issues of data and system security due to its unique nature and key factors such as portability, interoperability, multi-tenancy and the impact of open source.

Key Topics

  • Multi-tenancy
  • Lock-in
  • Compliance
  • Assurance
  • Government interference
  • Movability of data and applications
  • Data confidentiality (e.g. cloud vs. USB)
  • Configuration control
  • Portability
  • Interoperability
  • Legal issues in cloud
  • What are the commonalities of the legal framework across countries and specific issues in country
  • Intellectual property, copyright
  • Government directives
  • Contractual issues
  • Types of compensation and quality of service issues
  • Accountability of third parties
  • Endpoint control
  • Concentrated points of failure or distributed recovery?  When things are this interconnected, can failures ripple more easily?
  • Service provider / vendor relationship management
  • Metering and billing – if you don’t pay your cloud bill does someone shut off your service?
  • Open source and cloud
  • Cloud based catalogs and marketplaces
  • Cloud development
  • Open source licensing
  • Catalog and source code management in cloud

Module 7. Existing Security Reference Models and Standards

The aim of this module is to establish the range and types of security reference models and emerging and current standards relating to security and the cloud so that the candidate can apply that awareness to their specific cloud computing role.

An appreciation and detailed awareness of the security context and related standards in cloud computing is necessary for defining criteria to assess, evaluate and design management systems for the cloud that are both relevant and compliant. 

Key Topics

  • Explore the various types of Reference Architectures RA’s
  • CSA
  • NIST
  • ISO27000x

Module 8. Identifying the “Delta” in your IT and Business Architecture for Cloud Security

The aim of this module is to walk through an example security risk assessment in a cloud computing environment so that the candidate understands the critical issues and criteria for different cloud models.
The example will deal in terms of both technical and business risk and the wider context of risk and compliance in which cloud computing is just part of the overall business and operating model context.  
This learning unit also examines issues and evaluation criteria for difference cloud scenarios, both new and existing or blended or legacy versus cloud risk comparisons.  

Key Topics

  • Auditing and Assessment
    • Typical steps in conducting an assessment
    • Identify and select Security Reference Models
    • Identify compliance and certification requirements and standards (mandatory, )
    • Conduct survey and identify current Trust and Domain zones of an architecture and organization
    • Identify gaps in current protection points and impact from cloud
    • Methods of Security Auditing and Assurance 
  • Lifecycle stages of cloud
    • Buyers
    • Sellers
    • Consumers
    • Providers
    • Intermediary
    • Auditor
    • Legislator
  • Legal
    • Issues and evaluation in assessment of “green field” – new service
    • Issues and evaluation in assessment of “Brown field” – existing cloud environment
    • Examples of recent media discussion on security and the cloud. There are many others
    • Issues and evaluation of legacy and cloud environment comparisons

Module 9. Risk Management and the Cloud

The aim of this module is to explore solutions for mitigating and managing risk in the cloud so that the candidate can apply that awareness from both consumer and provider perspectives.
The specific focus is on “Design for Assurance” using cloud security and cloud assurance systems and specific security management components and tools designed for cloud computing.

Key Topics

  • Design for Assurance
    • Repudiation and Integrity
    • Cloud products and services lifecycle management (governing products) and standards
    • SOEs, PODS, and APIs standards , features and  options, configuration and version management
    • Sustainability , CSR and green cloud assessment planning
    • AD, SSO , authentication , digital signatures, DRM digital rights management
    • Disaster recovery  and business continuity planning
    • Recovery and audit planning and control
  • Security Management in Cloud
    • Access management and cloud
    • Cryptography and cloud
    • Integration security challenges in cloud:  data/ service / feed / API
    • Integration and transition management
    • Environment fidelity and assurance
    • User-centric policy issues
    • Mobility and cloud
    • Cloud risk assessment and quality assurance assessment
    • Vertical industry sector security and compliance issues
    • Compliance management issues and cloud computing
    • Certification management issues and cloud computing
    • Sustainability and green issues
    • Environmental and socio political issues
    • Processes / behaviors / boundaries

Module 10. IT Governance and Security

The aim of this module is to examine the broad scope and processes of IT governance and security so that the candidate can apply that awareness to their specific cloud computing role.

Key Topics

  • Concepts of operations, transition, change management and transformation
  • Governance role and key governance processes
  • Security protection points, governance information life cycle
  • Trust management and domains control (internal and external to organization and device)
  • Security planning, audit and controls
  • Procurement
  • ODCA models http://www.opendatacenteralliance.org/
  • Sprawl
  • Version management

Module 11. Monitoring – Users and Systems

The aim of this module is to explore active and passive monitoring in cloud computing so that the candidate has an understanding of appropriate monitoring and tracking of both individual users and systems as a whole.
The monitoring of users and systems that are on premise and off  premise involve a series of technologies and processes that include active and passive monitoring and detection systems.  The scope of this in Cloud Computing from consumer, provider and intermediary perspectives are considered , the types of tools for cloud environment monitoring , integration with legacy systems; methods of intrusion detection monitoring, assurance and planning.

Key Topics

  • Types of monitoring
  • Consumer perspective of cloud usage
  • Provider perspective of cloud usage
  • Intermediaries perspective of cloud usage
  • Monitor intrusion detection
  • SLA monitoring
  • Real time monitoring
  • Diagnostics of attack
  • Continuous monitoring and use of security performance metrics

Module 12. Contract Management and T’s & C’s: Terms and Conditions

The aim of this module is to explore the various contract management practices and issues within cloud computing so that the candidate can apply that awareness to their specific cloud computing role.

Key Topics

  • Types of contract
  • Contract and contract-less cloud services
  • Licenses and open source
  • Outsourcing and cloud sourcing impact and differences
  • Terms and conditions in cloud computing issues
  • Contract templates and standardization
  • Rate card ad “off-the menu” contracting
  • Open source
  • Liability
  • Incentives
  • Penalties
  • Negotiation
  • Subscription and chargeback mechanisms
  • Do’s and don’ts examples
  • Key issues

Module 13. Legal Controls, IP Intellectual Property and Privacy

The aim of this module is to consider specific issues of legal concern, competition / anti-trust law, intellectual property, copyright, privacy and protection of rights relating to cloud computing so that the candidate can apply that awareness to their specific cloud computing role.

These are matters that enforcement and enactment by government and intergovernmental legal functions and regulations affecting sovereignty, location, tax and property laws are seen as having significant impact on cloud computing.

Key Topics

  • Legal jurisdiction
  • Patriot act versus safe harbor
  • Privacy
  • Protection
  • Copyright
  • IP
  • Contract law
  • Employment law
  • Personal data and privacy
  • NSP and ISP, telecoms impact and cloud computing security

Module 14. IaaS Security and Governance Policies

The aim of this module is to examine specific security and governance issues for the IaaS model so that the candidate can apply that awareness to design and management of IaaS systems.

Key Topics

  • Network encryption – between cloud and on / off premise
    • Network encryption methods
    • Impact of cloud computing on networks
    • Impact on encryption system
  • Data encryption methods and types and cloud environments
    • Data encryption methods
    • Impact of cloud on data management and security
    • Methods of data encryption in cloud environments
  • Test and manage
    • Test management methods
    • Cloud testing systems
  • Penetration tests
    • Methods of penetration testing in IaaS environments
    • Public IaaS
    • Private IaaS
    • Community IaaS
    • Hybrid IaaS
  • Vulnerability management
    • Business vulnerabilities
    • Technical vulnerabilities
  • Robust design – segregation and VPC (Virtual Private Cloud)
    • Public and private IaaS security features
    • IaaS components
    • Security features
  • Communication domain controls
    • Communication domains
    • Cloud issues
  • Integration controls – non-repudiation
    • Integration inside cloud environments
    • Integration outside cloud environments
    • Non-repudiation
    • Distributed infrastructure management issues
  • Secure build
    • Cloud security strategy
    • Control of cloud environments
  • Standardized builds, SOEs (Standard Operating Environments) PODs (Deployment Modules)
    • Standardization
    • Templates
    • Modularity
    • Configuration
    • Cloud issues

Module 15. IaaS:  Encryption and DRM Digital Rights Management

The aim of this module is to examine how data in cloud environments can be protected by encryption so that the candidate can apply that awareness to their specific cloud computing role.

This learning module covers the specific examples and issues of legal concerns, competition / anti-trust Law, Intellectual Property, Copyright, Privacy and protection of rights relating to cloud computing.
Intellectual Property and Copyright protection are key issues in ensuring the legal use and compliance of products and services.  This includes understanding the role of Digital Rights Management, Digital Signatures and services to ensure identity controls and effective encryption to deter wrongful access and use.
These are matters that enforcement and enactment of government and intergovernmental legal roles and regulations affecting sovereignty, location, tax and property laws are seen as having significant impact with cloud computing.

Key Topics

  • Encryption
  • Obfuscation
  • Encryption systems and standards
  • Link to CRM and other systems
  • Cloud impact

Module 16. IaaS:  Network Connectivity Security – APIs and Gateways

The aim of this module is to explore the topic of network security in light of the advent of cloud computing so that the candidate can apply that awareness to their specific cloud computing role.

Key Topics

  • Types of networks
  • Wireless networks
  • Mobile 3G, 4G, 4LTE networks
  • Endpoints and nodes
  • Physical and virtual switches
  • Routers
  • VPN, Virtual Private Networks
  • Firewall access and policy controls
  • Protocols and service APIs

Module 17. IaaS: Disaster Recovery, Business Continuity, Capacity and Performance Planning

The aim of this module is to establish the core issues surrounding continuity planning in cloud environments so that the candidate can take these factors into account when addressing cloud security.  This module examines Disaster Recovery (DR) and Business Continuity (BC) Planning - Performance and Capacity Management

Key Topics

  • DR and BC Planning
  • Cloud Issues
  • DR planning in Cloud Computing
  • BC planning in Cloud Computing
  • Virtualization Enabled Host/Resource Mobility as a Defense

Module 18. IaaS: Security Automation Tools and Cloud Computing – Cloud Security Technology

The aim of this module is to explore the types of security systems that can be used in cloud computing so that the candidate can apply that awareness to their specific cloud computing role.
The automation of security management in the cloud requires differing tools and involves differing issues depending on whether it is from the perspective of consumers, providers, intermediaries or seeking to address wider governance issues.

Key Topics

  • Security tools
  • Audit tools and cloud
  • Policy automation
  • Traceability and tracking in the cloud
  • Cloud security tools reference architectures examples

Module 19. PaaS Security and Governance Policies

The aim of this module is to examine specific security and governance issues for the PaaS model so that the candidate can apply that awareness to design and management of PaaS systems.

Key Topics

  • Code Review
    • Methods and code quality assurance and review for cloud PaaS and IDE management
    • IDEs
    • Coding practices
    • PaaS coding practices
    • Code check list for PaaS
  • Due diligence of code
    • Issues in due diligence and cloud
    • Due diligence processes
    • Issues and resolutions
  • Secure development code standards
    • Practices in secure code development
    • PaaS environment controls
    • PaaS development practices
  • Standardized component design builds
    • Commoditization
    • Change versus extensions
    • Coding practices
    • Open source and standardization
  • Component reuse control
    • Methods for component templates and version / configuration management  for cloud PaaS and IDE management
    • Designing modularity
    • Licensing methods and cloud
    • Version management and cloud
    • Configuration management and cloud
  • Code certification controls
    • Methods for code and solution certification and review for cloud PaaS and IDE management
    • Software quality controls systems
    • Software certification
    • Staff skills and certification

Module 20. PaaS: Version Management SDLC

The aim of this module is to highlight version issues of version and configuration management so that the candidate can successfully apply that awareness throughout the cloud development life cycle.

Key Topics

  • Software Development Cycles (SDCs)
  • Version management
  • Configuration management
  • Multi-tenancy and security issues
  • IaaS version management
  • PaaS version management
  • SaaS version management

Module 21. SaaS Security and Governance Policies

The aim of this module is to examine specific security and governance issues for the SaaS model so that the candidate can apply that awareness to design and management of SaaS systems.

Key Topics

  • End-point controls
    • Types of software and network endpoints
    • Security issues
    • Endpoint management and protection
  • Application security controls
    • Security concerns with SaaS solutions and environments
    • SaaS application controls
    • Issues and resolutions
  • Penetration tests
    • Types of penetration tests and cloud
    • Types of SaaS penetration tests
    • Issues and resolutions
  • Audit and monitor usage
    • Types of endpoints and security controls
    • IT audit standards
    • Issues in auditing SaaS
    • Endpoint management
    • API controls
    • Monitoring SaaS usage
    • e-Discovery

Module 22. SaaS: IDAM Identity and Access Management – Federated Administration Credentials

The aim of this module is to consider the issues and design choices of identity management in cloud computing so that the candidate can manage identity and access issues in both on-premise/ off-premise systems and services.

Key Topics

  • Explore the various types of identity management issues and architecture solutions
  • Identity management
  • Trust domains and Identity rules and controls
  • Scenarios for placing active directory controls inside and outside the firewall
  • Federated identity management and cloud computing

Module 23. SaaS: Single Sign-on

The aim of this module is to consider the issues and design choices of Federated Identity and SSO processes in cloud computing so that the candidate can ensure on-demand data center access.  We examine aspects of partitioned Workflow, Decentralized Execution, Authentication, Authorization   Processes and SSO Single Sign-on
With the advent of many cloud services from multiple cloud and non-cloud sources through multiple devices, browsers, portals and marketplaces, access has become potentially a complicated issue, with a requirement to control and manage secure credentials and identity.
It has been said, “There is no point in having a cloud data center if you can not access the services.” With applications and web services coming through APIs or with deeper access to IaaS and other types of on-demand environments, how identity access and account and security policy management is achieved is a key concern in modern cloud computing systems and architectures.

Key Topics

  • Explore partitioned workflows, decentralized execution, SSO and authorization processes
  • Partitioning workflows and decentralized execution
  • Authentication
  • Authorization
  • Single sign on
  • Uses of SSO in cloud
  • Trust domains and identity rules and controls
  • Scenarios for placing active directory controls inside and outside the firewall
  • Federated identity management and cloud computing

Module 24. SaaS: Assurance and Audit

The aim of this module is to identify the core audit and assurance standards and processes so that the candidate can apply that awareness to their specific cloud computing role. This module examines due Diligence e.g. SA70, ISO27001 and other related audit topics

Key Topics

  • Audit and cloud computing
  • Audit processes
  • Audit issues and scenarios
  • ENISA
  • Federal audits
We regularly offer classes in these and other cities. Atlanta, Austin, Baltimore, Calgary, Chicago, Cleveland, Dallas, Denver, Detroit, Houston, Jacksonville, Miami, Montreal, New York City, Orlando, Ottawa, Philadelphia, Phoenix, Pittsburgh, Seattle, Toronto, Vancouver, Washington DC.
*Your name:

*Your e-mail:

*Phone:

*Company name:

Additional notes:

We have received your message. A sales representative will contact you soon.

Thank you!.

more details
buy this course

Register for a courseware sample

It's simple, and free.

 

Thank You!

You will receive an email shortly containing a link to download the requested sample of the labs for this course.