CCSP 2019: Managing & Securing Cloud Infrastructure
CCSP 2019
| Intermediate
- 16 Videos | 56m 12s
- Includes Assessment
- Earns a Badge
Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize hardware specific security configuration requirements such as BIOS, settings for TPM, KVM switches, HSM, storage controllers, and network controllersdeploy a cloud virtual machine using a templateinstall Microsoft Azure virtual machine extensionsdefine techniques to secure network configuration and network support tools, including VLAN, TLS, DHPC and Authorized DHCP, DNS, and IPsecdefine the deployment of network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigationdescribe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoptiondefine operating system hardening techniques with reference to operating systems like Windows, Linux, VMware, etc.
-
deploy Microsoft Azure virtual machines into an availability setconnect to a Microsoft Azure Windows virtual machine using RDPconnect to a Microsoft Azure Linux virtual machine using SSHview Microsoft Azure virtual machine metricsenable Microsoft Azure virtual machine metric alertsenable on-premises file server cloud backupenable Microsoft Azure virtual machine cloud backupssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 1sUP NEXT
-
2.Hardware Specific Security3m 12s
-
3.Virtualization Template Deployment2m 55s
-
4.Guest Operating System Virtualization Toolsets3m 21s
-
5.Network Configuration6m 45s
-
6.Network Security Management3m 37s
-
7.Host Management4m 17s
-
8.Operating System Hardening4m 59s
-
9.Availability of Guest Operating System5m 12s
-
10.RDP Remote Access1m 28s
-
11.SSH Remote Access1m 59s
-
12.Performance Monitoring3m 30s
-
13.Performance Metric Alerts4m 23s
-
14.On-Premises File Server to Cloud Backup4m 46s
-
15.Virtual Machine Backup2m 46s
-
16.Course Summary1m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.