Cloud Infrastructure & Risk Analysis

Cloud    |    Expert
  • 9 videos | 51m 38s
  • Includes Assessment
  • Earns a Badge
Likes 29 Likes 29
Using physical and virtual technologies has made cloud services a financially viable business model. Examine these components and how risk analysis is used in developing and employing security measures to protect cloud components.

WHAT YOU WILL LEARN

  • recognize the physical and virtual components within a cloud platform
    define the networking and communication architecture of a cloud platform
    define the compute service as it applies to the cloud platform
    define the available virtualization options within a cloud platform
    define storage and Storage as a Service (STaaS) within a cloud platform
  • describe and define risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computing
    describe and define known threats and attack vectors associated with cloud services and infrastructure
    define virtualization-specific areas of focus with reference to security such as Hypervisor, VM files, and VM deletion
    define and describe threat mitigation and attack handling techniques including ACL, designing in security, and adopting security measures

IN THIS COURSE

  • 3m 57s
    After completing this video, you will be able to recognize the physical and virtual components within a cloud platform. FREE ACCESS
  • 5m 4s
    Learn how to define the networking and communication architecture for a cloud platform. FREE ACCESS
  • Locked
    3.  Compute Service
    6m 25s
    In this video, you will learn how to define the compute service as it applies to the cloud platform. FREE ACCESS
  • Locked
    4.  Virtualized Infrastructure
    7m 43s
    During this video, you will learn how to define the available virtualization options within a cloud platform. FREE ACCESS
  • Locked
    5.  Storage Service
    4m 53s
    Learn how to define storage and Storage as a Service (STaaS) within a cloud platform. FREE ACCESS
  • Locked
    6.  Risk
    8m 8s
    After completing this video, you will be able to describe and define risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computing. FREE ACCESS
  • Locked
    7.  Threat and Attack
    4m 28s
    After completing this video, you will be able to describe and define known threats and attack vectors associated with cloud services and infrastructure. FREE ACCESS
  • Locked
    8.  Virtualization Vulnerabilities
    5m 41s
    Find out how to define virtualization-specific areas of focus with reference to security such as the Hypervisor, VM files, and VM deletion. FREE ACCESS
  • Locked
    9.  Defense
    5m 18s
    In this video, find out how to define and describe threat mitigation and attack handling techniques including access control lists, designing in security, and adopting security measures. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 662 Likes 662  
Likes 373 Likes 373