Cloud Platform Security: Infrastructure Protection

Cloud Security    |    Intermediate
  • 18 videos | 1h 32m 12s
  • Includes Assessment
  • Earns a Badge
Rating 3.9 of 20 users Rating 3.9 of 20 users (20)
In this course, you'll learn how to protect organizational cloud infrastructure by optimizing security using tools like Azure Advisor. This will help you to understand seccurng cloud contents, configuring the security for these contents, methods of implementing access control lists (ACLs) to secure the storage and network in the cloud. You'll explore how to apply security measures on different levels of security using available features, tools and also you will learn about hardware security modules and key vaults.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how to secure your cloud deployments
    Describe functions of azure advisor
    Specify the security levels of cloud infrastructure
    Identify ways how to secure content using cloud infrastructure
    Describe the process that google uses to setup their security using cloud infrastructure
    List methods for implementing acls in gcp and aws
    Use acls to provide custom access
    Identify how to secure cloud storage using acl in gcp
  • Describe the applications of acl in azure
    List the ways to control the access on cloud infrastructure network
    Use hardware encryption to secure hardware data
    Configure the hardware security module in azure
    Apply the cloud hardware security module in gcp
    Distinguish between kms and cryptographic keys
    Describe azure key vault
    Identify the features of cloud kms and describe how the cloud-hosted key management service lets you manage cryptographic keys for your cloud services
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 36s
  • 3m 47s
    In this video, you will learn how to secure your cloud deployments. FREE ACCESS
  • Locked
    3.  Using Azure Advisor
    6m 57s
    After completing this video, you will be able to describe the functions of Azure Advisor. FREE ACCESS
  • Locked
    4.  Security Layers of Cloud Infrastructure
    7m 26s
    Upon completion of this video, you will be able to specify the security levels of cloud infrastructure. FREE ACCESS
  • Locked
    5.  Applying Cloud Security
    5m 54s
    In this video, you will identify ways to secure content using cloud infrastructure. FREE ACCESS
  • Locked
    6.  Google Cloud Platform Security
    11m 49s
    After completing this video, you will be able to describe the process that Google uses to set up their security using cloud infrastructure. FREE ACCESS
  • Locked
    7.  Access Control Lists (ACLs)
    4m 53s
    Upon completion of this video, you will be able to list methods for implementing access control lists in GCP and AWS. FREE ACCESS
  • Locked
    8.  Custom Access Provisioning Using ACLs
    2m 47s
    In this video, find out how to use access control lists to provide custom access. FREE ACCESS
  • Locked
    9.  Configuring ACLs in GCP
    4m 59s
    In this video, you will learn how to secure cloud storage using ACL in GCP. FREE ACCESS
  • Locked
    10.  Applications of ACLs in Azure
    9m 49s
    Upon completion of this video, you will be able to describe the applications of Azure ACLs. FREE ACCESS
  • Locked
    11.  Using NSGs to Control Network Access
    6m 54s
    After completing this video, you will be able to list the ways to control access to cloud infrastructure network. FREE ACCESS
  • Locked
    12.  Applying Certified Encryption on Hardware
    5m 7s
    In this video, find out how to use hardware encryption to secure your data. FREE ACCESS
  • Locked
    13.  Enabling the Hardware Security Module in Azure
    4m 48s
    In this video, learn how to configure the Hardware Security Module in Azure. FREE ACCESS
  • Locked
    14.  Using the Cloud Hardware Security Module in GCP
    2m 35s
    In this video, you will apply the cloud Hardware Security Module in Google Cloud Platform. FREE ACCESS
  • Locked
    15.  Understanding Cryptographic Keys and KMS
    6m 19s
    Learn how to distinguish between KMS keys and cryptographic keys. FREE ACCESS
  • Locked
    16.  Azure Key Vault
    3m 33s
    Upon completion of this video, you will be able to describe Azure Key Vault. FREE ACCESS
  • Locked
    17.  GCP Cloud KMS
    2m 12s
    In this video, you will identify the features of Cloud KMS and describe how the cloud-hosted key management service lets you manage cryptographic keys for your cloud services. FREE ACCESS
  • Locked
    18.  Course Summary
    48s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 673 users Rating 4.7 of 673 users (673)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.6 of 66 users Rating 4.6 of 66 users (66)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 3.9 of 7 users Rating 3.9 of 7 users (7)
Rating 4.4 of 63 users Rating 4.4 of 63 users (63)
Rating 4.5 of 443 users Rating 4.5 of 443 users (443)