Cloud Platform Security: Infrastructure Protection
Cloud Security
| Intermediate
- 18 videos | 1h 32m 12s
- Includes Assessment
- Earns a Badge
In this course, you'll learn how to protect organizational cloud infrastructure by optimizing security using tools like Azure Advisor. This will help you to understand seccurng cloud contents, configuring the security for these contents, methods of implementing access control lists (ACLs) to secure the storage and network in the cloud. You'll explore how to apply security measures on different levels of security using available features, tools and also you will learn about hardware security modules and key vaults.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify how to secure your cloud deploymentsDescribe functions of azure advisorSpecify the security levels of cloud infrastructureIdentify ways how to secure content using cloud infrastructureDescribe the process that google uses to setup their security using cloud infrastructureList methods for implementing acls in gcp and awsUse acls to provide custom accessIdentify how to secure cloud storage using acl in gcp
-
Describe the applications of acl in azureList the ways to control the access on cloud infrastructure networkUse hardware encryption to secure hardware dataConfigure the hardware security module in azureApply the cloud hardware security module in gcpDistinguish between kms and cryptographic keysDescribe azure key vaultIdentify the features of cloud kms and describe how the cloud-hosted key management service lets you manage cryptographic keys for your cloud servicesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 36s
-
3m 47sIn this video, you will learn how to secure your cloud deployments. FREE ACCESS
-
6m 57sAfter completing this video, you will be able to describe the functions of Azure Advisor. FREE ACCESS
-
7m 26sUpon completion of this video, you will be able to specify the security levels of cloud infrastructure. FREE ACCESS
-
5m 54sIn this video, you will identify ways to secure content using cloud infrastructure. FREE ACCESS
-
11m 49sAfter completing this video, you will be able to describe the process that Google uses to set up their security using cloud infrastructure. FREE ACCESS
-
4m 53sUpon completion of this video, you will be able to list methods for implementing access control lists in GCP and AWS. FREE ACCESS
-
2m 47sIn this video, find out how to use access control lists to provide custom access. FREE ACCESS
-
4m 59sIn this video, you will learn how to secure cloud storage using ACL in GCP. FREE ACCESS
-
9m 49sUpon completion of this video, you will be able to describe the applications of Azure ACLs. FREE ACCESS
-
6m 54sAfter completing this video, you will be able to list the ways to control access to cloud infrastructure network. FREE ACCESS
-
5m 7sIn this video, find out how to use hardware encryption to secure your data. FREE ACCESS
-
4m 48sIn this video, learn how to configure the Hardware Security Module in Azure. FREE ACCESS
-
2m 35sIn this video, you will apply the cloud Hardware Security Module in Google Cloud Platform. FREE ACCESS
-
6m 19sLearn how to distinguish between KMS keys and cryptographic keys. FREE ACCESS
-
3m 33sUpon completion of this video, you will be able to describe Azure Key Vault. FREE ACCESS
-
2m 12sIn this video, you will identify the features of Cloud KMS and describe how the cloud-hosted key management service lets you manage cryptographic keys for your cloud services. FREE ACCESS
-
48s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Journey
Cyber Specialist to CCSP