CCSP 2019: Data Center Security
CCSP 2019
| Intermediate
- 16 videos | 1h 50s
- Includes Assessment
- Earns a Badge
Risk management ensures that realized threats have minimal impact on business operations. This 16-video course explores how security controls address security objectives, as well as the IT audit process, and how to configure high availability for cloud services. This course helps learners prepare for the Certified Cloud Security Professional exam. Key concepts covered include: risk as it applies to cloud services and underlying infrastructure, and risk analysis and management posture regarding cloud computing; integration of information security and risk management activities into a formal framework; threats and attack vectors associated with cloud services and infrastructure; and threat mitigation and attack handling techniques. Next, learn to generate an Azure storage account shared access signature, how to deploy an Azure network security group; and how to configure an Azure role-based access control (RBAC) to control virtual machine (VM) management. Finally, learn about certain auditing techniques and responsibilities and various types of audit reports. Learn how to conduct an Azure VM failover test; to deploy an Azure VM scale set; and to deploy an Azure load balancer.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe risk as it applies to cloud services and underlying infrastructure and adopt a risk analysis and management posture regarding cloud computingoutline the integration of information security and risk management activities into a formal frameworkdescribe known threats and attack vectors associated with cloud services and infrastructuredescribe threat mitigation and attack handling techniques including ACL, designing in security, and adopting security measuresgenerate a Microsoft Azure storage account shared access signaturedeploy a Microsoft Azure network security groupconfigure Microsoft Azure RBAC to control virtual machine management
-
recognize the difference between authentication and authorizationdefine auditing techniques and responsibilities within certain scopes, including asset access, asset status, deletions, archiving, and reportinglist various types of audit reports such as Statement on Standards for Attestation Engagements, Security Operations Center, and International Standard on Assurance Engagementsenable business continuity by replicating virtual machines to secondary regionsconduct a Microsoft Azure virtual machine failover testdeploy a Microsoft Azure virtual machine scale setdeploy a Microsoft Azure load balancersummarize the key concepts covered in this course
IN THIS COURSE
-
2m 7s
-
5m 13s
-
4m 3s
-
4m 28s
-
5m 30s
-
2m 37s
-
4m 24s
-
3m 47s
-
4m 11s
-
5m 10s
-
3m 5s
-
2m 39s
-
4m 10s
-
4m 30s
-
3m 53s
-
1m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.