{"id":13806,"date":"2025-08-20T13:10:42","date_gmt":"2025-08-20T10:10:42","guid":{"rendered":"https:\/\/mada.edu.sa\/?post_type=course&#038;p=13806"},"modified":"2026-04-20T12:35:37","modified_gmt":"2026-04-20T09:35:37","slug":"iso-27017","status":"publish","type":"course","link":"https:\/\/mada.edu.sa\/en\/course\/iso-27017\/","title":{"rendered":"ISO 27017 Information Security in Cloud Computing Course"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>The <strong>ISO 27017 (Information Security in Cloud Computing) Course<\/strong> is an advanced theoretical training program designed to provide a comprehensive understanding of the requirements and international standards of ISO\/IEC 27017. This standard serves as an essential extension of ISO 27001, focusing specifically on guidelines for protecting data and information that is stored, processed, or transmitted via cloud infrastructure.<\/p>\n<p>The course highlights fundamental principles of risk management within cloud environments, including privacy protection, secure transmission, and access management. It emphasizes the distinct roles of both cloud service providers (CSPs) and customers in maintaining security. Delivered entirely through a theoretical lens without direct technical applications, this program is ideal for managers, cybersecurity engineers, compliance officers, and administrators operating within organizations that rely on cloud-based solutions. Key topics include cloud threat management, data classification, encryption, and the critical nature of contractual agreements between providers and clients.<\/p>\n<h2>General Objective<\/h2>\n<p>The primary goal of the ISO 27017 program is to empower participants with a deep theoretical understanding of the framework governing information protection in cloud environments, based on international standards issued by ISO\/IEC. The program seeks to build the trainees&#8217; capacity to analyze cloud-specific risks, distinguish between provider and customer responsibilities, and identify appropriate controls to mitigate threats. Furthermore, it fosters awareness regarding the importance of international compliance and the role of proactive policies in supporting business continuity. No prior experience in technical system implementation is required; instead, the course presents concepts in an analytical manner to build a strategic vision of cloud security.<\/p>\n<h2>Detailed Objectives<\/h2>\n<ul>\n<li>Understand the core concepts of the ISO 27017 standard and its global significance in cloud computing.<\/li>\n<li>Identify the key differences and relationship between ISO 27001 and ISO 27017.<\/li>\n<li>Recognize the importance of data classification and protection within cloud-specific contexts.<\/li>\n<li>Learn how to manage access and reduce cloud-based security threats theoretically.<\/li>\n<li>Understand the role of Service Level Agreements (SLAs) in ensuring cloud security and accountability.<\/li>\n<\/ul>\n<h2>Course Curriculum<\/h2>\n<h3>Day 1: Introduction to ISO 27017 and the Need for Cloud Security<\/h3>\n<ul>\n<li>Definition of ISO 27017 and its role as an extension of ISO 27001.<\/li>\n<li>Comparing traditional information security with cloud-specific security.<\/li>\n<li>Security challenges in cloud environments: Attacks, leaks, and unauthorized exploitation.<\/li>\n<li>The role of ISO 27017 in building trust between service providers and customers.<\/li>\n<\/ul>\n<h3>Day 2: Risk Management in Cloud Computing<\/h3>\n<ul>\n<li>Identifying risks associated with cloud infrastructure and multi-tenancy.<\/li>\n<li>Data classification based on sensitivity: Public, Sensitive, and Confidential.<\/li>\n<li>Vulnerability analysis within cloud computing systems.<\/li>\n<li>The critical role of encryption in protecting data at rest and in transit.<\/li>\n<\/ul>\n<h3>Day 3: Roles of Service Providers and Customers<\/h3>\n<ul>\n<li>Responsibilities of Cloud Service Providers (CSPs) in information protection.<\/li>\n<li>The customer\u2019s role in securing their data within the cloud infrastructure.<\/li>\n<li>The Shared Responsibility Model: Collaboration for joint security.<\/li>\n<li>Analysis of Service Level Agreements (SLAs) and their impact on security posture.<\/li>\n<\/ul>\n<h3>Day 4: Cloud-Specific Security Controls<\/h3>\n<ul>\n<li>Network controls: Protecting endpoints and securing data transmission.<\/li>\n<li>Access management: Multi-Factor Authentication (MFA) and the principle of least privilege.<\/li>\n<li>Securing cloud applications: Best practices for encryption and secure selection.<\/li>\n<li>Mechanisms for continuous monitoring and oversight of cloud activities.<\/li>\n<\/ul>\n<h3>Day 5: Compliance and the Digital Future<\/h3>\n<ul>\n<li>The importance of ISO 27017 compliance in large-scale digital projects.<\/li>\n<li>The role of internal and external audits in evaluating system performance.<\/li>\n<li>The future of cloud security: Integration of AI, Machine Learning, and automation.<\/li>\n<li>Emerging trends: Quantum encryption, hybrid cloud security, and total digital transformation.<\/li>\n<\/ul>\n<hr \/>\n<p>The <strong>ISO 27017 Information Security in Cloud Computing Course<\/strong> is a pivotal building block for developing competencies capable of protecting data in an increasingly cloud-dependent world. This course is of vital importance to cybersecurity engineers, IT supervisors, compliance officers, and project managers. By enhancing the ability to assess risks and make informed decisions, this program supports international compliance and ensures that privacy and business continuity remain at the forefront of digital operations. The advanced theoretical knowledge provided enables participants to think proactively about risk management and supports the development of robust, sustainable security systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The ISO 27017 (Information Security in Cloud Computing) Course is an advanced theoretical training program designed to provide a comprehensive understanding of the requirements and international standards of ISO\/IEC 27017. This standard serves as an essential extension of ISO 27001, focusing specifically on guidelines for protecting data and information that is stored, processed, or &#8230; <a title=\"ISO 27017 Information Security in Cloud Computing Course\" class=\"read-more\" href=\"https:\/\/mada.edu.sa\/en\/course\/iso-27017\/\" aria-label=\"Read more about ISO 27017 Information Security in Cloud Computing Course\">\u0625\u0642\u0631\u0623 \u0627\u0644\u0645\u0632\u064a\u062f<\/a><\/p>\n","protected":false},"author":146,"featured_media":13805,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"course_category":[146,114],"class_list":["post-13806","course","type-course","status-publish","has-post-thumbnail","hentry","course_category-networks-and-cybersecurity","course_category-occupational-health-and-safety","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course"}],"about":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/types\/course"}],"author":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/users\/146"}],"replies":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/comments?post=13806"}],"version-history":[{"count":2,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13806\/revisions"}],"predecessor-version":[{"id":13814,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13806\/revisions\/13814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/media\/13805"}],"wp:attachment":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13806"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}