S3NS100CCL

Trusted Cloud Leader

This training provides a comprehensive overview of the S3NS trusted cloud, born from the alliance between Thales and Google Cloud. Designed for decision-makers, sales professionals, IT professionals, and anyone wishing to discover the S3NS Trusted Cloud, it covers digital sovereignty challenges, the S3NS value proposition, CRYPT3NS and PREMI3NS offerings, SecNumCloud requirements, and innovation in a sovereign environment.

đźš§ This training is currently being finalized and will be officially available in March. We are working hard to deliver high-quality content.

In the meantime, don't miss the opportunity to be among the first informed: feel free to contact us now or register to reserve your seats as a priority or to book a private session!

S3NS
✓ Official training S3NSLevel Fundamentals⏱️ 1 day (7h)

What you will learn

  • Understand the value of Trusted Cloud.
  • Demystify SecNumCloud.
  • Know how to position the S3NS offering.

Prerequisites

  • None.

Target audience

  • Decision-makers (C-Level)., Sales professionals., IT professionals (including non-technical roles)., Anyone wishing to discover the S3NS Trusted Cloud.

Training Program

6 modules to master the fundamentals

Topics covered
  • →Cloud Fundamentals
  • →Geopolitical & Regulatory Context
  • →European Vision & SecNumCloud
  • →The S3NS Shared Responsibility Model
Activities

Module 1 knowledge validation quiz

Topics covered
  • →The Thales & Google Alliance: An unprecedented collaboration model
  • →Differentiation: GCP Standard vs CRYPT3NS vs PREMI3NS
  • →Decision Matrix: Which data for which Cloud?
  • →Adoption rationale: Compliance as a business accelerator
Activities

Module 2 knowledge validation quiz

Topics covered
  • →Introduction
  • →CRYPT3NS: Deep-dive
  • →CRYPT3NS in practice
Activities

Module 3 knowledge validation quiz

Topics covered
  • →Comprehensive overview of SecNumCloud requirements
  • →Protection Barriers (S3NS controls)
Activities

Module 4 knowledge validation quiz

Topics covered
  • →Reconciling Innovation and Compliance
  • →Data: The importance of classification
  • →Points of vigilance
  • →Typical architecture (Landing Zone, Data Platform, Serverless, Kubernetes)
Activities

Module 5 knowledge validation quiz

Topics covered
  • →Knowledge synthesis
  • →Comprehensive knowledge validation test
Activities

Comprehensive test covering all modules

Related Trainings

AWS

Advanced Architecting on AWS

In this course, each module presents a scenario with an architectural challenge to be solved. You will examine available AWS services and features as solutions to the problem. You will gain insights by participating in problem-based discussions and learning about the AWS services that you could apply to meet the challenges. Over 3 days, the course goes beyond the basics of a cloud infrastructure and covers topics to meet a variety of needs for AWS customers. Course modules focus on managing multiple AWS accounts, hybrid connectivity and devices, networking with a focus on AWS Transit Gateway connectivity, container services, automation tools for continuous integration/continuous delivery (CI/CD), security and distributed denial of service (DDoS) protection, data lakes and data stores, edge services, migration options, and managing costs. The course concludes by presenting you with scenarios and challenging you to identify the best solutions.

3 d
Advanced
AWS
Best

Architecting on AWS

Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure, and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned.

3 d
Intermediate

Upcoming sessions

No date suits you?

We regularly organize new sessions. Contact us to find out about upcoming dates or to schedule a session at a date of your choice.

Register for a custom date

Quality Process

SFEIR Institute's commitment: an excellence approach to ensure the quality and success of all our training programs. Learn more about our quality approach

Teaching Methods Used
  • Lectures / Theoretical Slides — Presentation of concepts using visual aids (PowerPoint, PDF).
  • Technical Demonstration (Demos) — The instructor performs a task or procedure while students observe.
  • Quiz / MCQ — Quick knowledge check (paper-based or digital via tools like Kahoot/Klaxoon).
Evaluation and Monitoring System

The achievement of training objectives is evaluated at multiple levels to ensure quality:

  • Continuous Knowledge Assessment : Verification of knowledge throughout the training via participatory methods (quizzes, practical exercises, case studies) under instructor supervision.
  • Progress Measurement : Comparative self-assessment system including an initial diagnostic to determine the starting level, followed by a final evaluation to validate skills development.
  • Quality Evaluation : End-of-session satisfaction questionnaire to measure the relevance and effectiveness of the training as perceived by participants.

Request a quote