CCSP 2019: Managing & Securing Cloud Infrastructure

CCSP 2019    |    Intermediate
  • 16 videos | 56m 12s
  • Includes Assessment
  • Earns a Badge
Likes 78 Likes 78
Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize hardware specific security configuration requirements such as BIOS, settings for TPM, KVM switches, HSM, storage controllers, and network controllers
    deploy a cloud virtual machine using a template
    install Microsoft Azure virtual machine extensions
    define techniques to secure network configuration and network support tools, including VLAN, TLS, DHPC and Authorized DHCP, DNS, and IPsec
    define the deployment of network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigation
    describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoption
    define operating system hardening techniques with reference to operating systems like Windows, Linux, VMware, etc.
  • deploy Microsoft Azure virtual machines into an availability set
    connect to a Microsoft Azure Windows virtual machine using RDP
    connect to a Microsoft Azure Linux virtual machine using SSH
    view Microsoft Azure virtual machine metrics
    enable Microsoft Azure virtual machine metric alerts
    enable on-premises file server cloud backup
    enable Microsoft Azure virtual machine cloud backups
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 126 Likes 126  
Likes 218 Likes 218