CCSP 2019: Managing & Securing Cloud Infrastructure

CCSP 2019    |    Intermediate
  • 16 Videos | 1h 3m 12s
  • Includes Assessment
  • Earns a Badge
Likes 53 Likes 53
Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key  concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize hardware specific security configuration requirements such as BIOS, settings for TPM, KVM switches, HSM, storage controllers, and network controllers
    deploy a cloud virtual machine using a template
    install Microsoft Azure virtual machine extensions
    define techniques to secure network configuration and network support tools, including VLAN, TLS, DHPC and Authorized DHCP, DNS, and IPsec
    define the deployment of network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigation
    describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoption
    define operating system hardening techniques with reference to operating systems like Windows, Linux, VMware, etc.
  • deploy Microsoft Azure virtual machines into an availability set
    connect to a Microsoft Azure Windows virtual machine using RDP
    connect to a Microsoft Azure Linux virtual machine using SSH
    view Microsoft Azure virtual machine metrics
    enable Microsoft Azure virtual machine metric alerts
    enable on-premises file server cloud backup
    enable Microsoft Azure virtual machine cloud backups
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 1s
    UP NEXT
  • Playable
    2. 
    Hardware Specific Security
    3m 12s
  • Locked
    3. 
    Virtualization Template Deployment
    2m 55s
  • Locked
    4. 
    Guest Operating System Virtualization Toolsets
    3m 21s
  • Locked
    5. 
    Network Configuration
    6m 45s
  • Locked
    6. 
    Network Security Management
    3m 37s
  • Locked
    7. 
    Host Management
    4m 17s
  • Locked
    8. 
    Operating System Hardening
    4m 59s
  • Locked
    9. 
    Availability of Guest Operating System
    5m 12s
  • Locked
    10. 
    RDP Remote Access
    1m 28s
  • Locked
    11. 
    SSH Remote Access
    1m 59s
  • Locked
    12. 
    Performance Monitoring
    3m 30s
  • Locked
    13. 
    Performance Metric Alerts
    4m 23s
  • Locked
    14. 
    On-Premises File Server to Cloud Backup
    4m 46s
  • Locked
    15. 
    Virtual Machine Backup
    2m 46s
  • Locked
    16. 
    Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE