Cloud Infrastructure & Risk Analysis
Cloud
| Expert
- 9 videos | 51m 38s
- Includes Assessment
- Earns a Badge
Using physical and virtual technologies has made cloud services a financially viable business model. Examine these components and how risk analysis is used in developing and employing security measures to protect cloud components.
WHAT YOU WILL LEARN
-
recognize the physical and virtual components within a cloud platformdefine the networking and communication architecture of a cloud platformdefine the compute service as it applies to the cloud platformdefine the available virtualization options within a cloud platformdefine storage and Storage as a Service (STaaS) within a cloud platform
-
describe and define risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computingdescribe and define known threats and attack vectors associated with cloud services and infrastructuredefine virtualization-specific areas of focus with reference to security such as Hypervisor, VM files, and VM deletiondefine and describe threat mitigation and attack handling techniques including ACL, designing in security, and adopting security measures
IN THIS COURSE
-
3m 57sAfter completing this video, you will be able to recognize the physical and virtual components within a cloud platform. FREE ACCESS
-
5m 4sLearn how to define the networking and communication architecture for a cloud platform. FREE ACCESS
-
6m 25sIn this video, you will learn how to define the compute service as it applies to the cloud platform. FREE ACCESS
-
7m 43sDuring this video, you will learn how to define the available virtualization options within a cloud platform. FREE ACCESS
-
4m 53sLearn how to define storage and Storage as a Service (STaaS) within a cloud platform. FREE ACCESS
-
8m 8sAfter completing this video, you will be able to describe and define risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computing. FREE ACCESS
-
4m 28sAfter completing this video, you will be able to describe and define known threats and attack vectors associated with cloud services and infrastructure. FREE ACCESS
-
5m 41sFind out how to define virtualization-specific areas of focus with reference to security such as the Hypervisor, VM files, and VM deletion. FREE ACCESS
-
5m 18sIn this video, find out how to define and describe threat mitigation and attack handling techniques including access control lists, designing in security, and adopting security measures. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.