CCSP 2019: Managing & Securing Cloud Infrastructure

CCSP    |    Intermediate
  • 16 videos | 56m 12s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 32 users Rating 4.4 of 32 users (32)
Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize hardware specific security configuration requirements such as bios, settings for tpm, kvm switches, hsm, storage controllers, and network controllers
    Deploy a cloud virtual machine using a template
    Install microsoft azure virtual machine extensions
    Define techniques to secure network configuration and network support tools, including vlan, tls, dhpc and authorized dhcp, dns, and ipsec
    Define the deployment of network security-related controls, including firewalls, ids, ips, honeypot deployment, and vulnerability assessment/threat mitigation
    Describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoption
    Define operating system hardening techniques with reference to operating systems like windows, linux, vmware, etc.
  • Deploy microsoft azure virtual machines into an availability set
    Connect to a microsoft azure windows virtual machine using rdp
    Connect to a microsoft azure linux virtual machine using ssh
    View microsoft azure virtual machine metrics
    Enable microsoft azure virtual machine metric alerts
    Enable on-premises file server cloud backup
    Enable microsoft azure virtual machine cloud backups
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 1s
  • 3m 12s
    After completing this video, you will be able to recognize hardware-specific security configuration requirements such as BIOS settings, TPM settings, KVM switch settings, HSM settings, storage controller settings, and network controller settings. FREE ACCESS
  • Locked
    3.  Virtualization Template Deployment
    2m 55s
    During this video, you will learn how to deploy a cloud virtual machine using a template. FREE ACCESS
  • Locked
    4.  Guest Operating System Virtualization Toolsets
    3m 21s
    During this video, you will learn how to install Microsoft Azure virtual machine extensions. FREE ACCESS
  • Locked
    5.  Network Configuration
    6m 45s
    Learn how to define techniques to secure network configuration and network support tools, including VLANs, TLS, DHCP, and Authorized DHCP, DNS, and IPsec. FREE ACCESS
  • Locked
    6.  Network Security Management
    3m 37s
    Learn how to deploy network security-related controls, including firewalls, IDS, IPS, honeypots, and vulnerability assessment/threat mitigation. FREE ACCESS
  • Locked
    7.  Host Management
    4m 17s
    After completing this video, you will be able to describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoption. FREE ACCESS
  • Locked
    8.  Operating System Hardening
    4m 59s
    Find out how to define operating system hardening techniques with reference to operating systems like Windows, Linux, VMware, etc. FREE ACCESS
  • Locked
    9.  Availability of Guest Operating System
    5m 12s
    In this video, you will deploy Microsoft Azure virtual machines into an availability set. FREE ACCESS
  • Locked
    10.  RDP Remote Access
    1m 28s
    In this video, learn how to connect to a Microsoft Azure Windows virtual machine using Remote Desktop Protocol. FREE ACCESS
  • Locked
    11.  SSH Remote Access
    1m 59s
    In this video, find out how to connect to a Microsoft Azure Linux virtual machine using Secure Shell (SSH). FREE ACCESS
  • Locked
    12.  Performance Monitoring
    3m 30s
    In this video, learn how to view metrics for your Microsoft Azure virtual machines. FREE ACCESS
  • Locked
    13.  Performance Metric Alerts
    4m 23s
    Learn how to enable Microsoft Azure virtual machine metric alerts. FREE ACCESS
  • Locked
    14.  On-Premises File Server to Cloud Backup
    4m 46s
    During this video, you will learn how to enable cloud backup for on-premises file servers. FREE ACCESS
  • Locked
    15.  Virtual Machine Backup
    2m 46s
    Learn how to enable Microsoft Azure virtual machine cloud backups. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 40 users Rating 4.7 of 40 users (40)
Rating 4.3 of 43 users Rating 4.3 of 43 users (43)
Rating 4.4 of 71 users Rating 4.4 of 71 users (71)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 84 users Rating 4.4 of 84 users (84)
Rating 4.4 of 51 users Rating 4.4 of 51 users (51)
Rating 4.7 of 85 users Rating 4.7 of 85 users (85)