Cloud Infrastructure Management
Cloud
| Expert
- 10 videos | 58m
- Includes Assessment
- Earns a Badge
Examine what's involved in managing the physical and logical infrastructure of a cloud system, including remote access controls, OS baselines and patch management, performance monitoring, network security controls, and event logging.
WHAT YOU WILL LEARN
-
describe the mechanisms for deploying Remote Access, including RDP, Secure Terminal Accessdefine the preservation of OS compliance with reference to monitoring and remediationdescribe requirements and best practices with reference to fixes, patches, and updatesdescribe requirement to continuously monitor and report on host component performancedescribe requirement to continuously monitor and report on host component health
-
describe the implementation of back and restore policy with reference to cloud components, including data, configurations, etc.define the deployment of network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigationdefine requirement for hardware event logging and reporting #1define requirement for hardware event logging and reporting #2discuss Management Plane options and techniques
IN THIS COURSE
-
5m 20sUpon completion of this video, you will be able to describe the mechanisms for deploying Remote Access, including RDP and Secure Terminal Access. FREE ACCESS
-
5m 13sIn this video, learn how to define OS compliance preservation with reference to monitoring and remediation. FREE ACCESS
-
6m 33sUpon completion of this video, you will be able to describe requirements and best practices with reference to fixes, patches, and updates. FREE ACCESS
-
6mAfter completing this video, you will be able to describe the requirement to continuously monitor and report on host component performance. FREE ACCESS
-
6m 18sUpon completion of this video, you will be able to describe the requirement to continuously monitor and report on host component health. FREE ACCESS
-
7m 9sUpon completion of this video, you will be able to describe the implementation of a backup and restore policy with reference to cloud components, including data, configurations, etc. FREE ACCESS
-
7m 23sIn this video, you will learn about deploying network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigation. FREE ACCESS
-
6m 4sLearn how to define requirements for hardware event logging and reporting #1. FREE ACCESS
-
3m 28sIn this video, you will learn how to define requirements for hardware event logging and reporting #2. FREE ACCESS
-
4m 31sFind out how to discuss management plane options and techniques. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.