Cloud Platform Security: System Monitoring & Protection

Cloud Security
  • 13 Videos | 1h 34m 44s
  • Includes Assessment
  • Earns a Badge
Likes 3 Likes 3
Cloud system monitoring is used to proactively identify and evaluate security vulnerabilities and allow organizations to explore options to protect their assets using available cloud platform tools. In this course, you'll learn how to proactively shield cloud infrastructure by monitoring organizational security using built-in Azure and Google Cloud Platform (GCP) security tools and services. You'll examine how to use monitoring tools like security information in Azure, Google Cloud Armor, Google Cloud Scanner, and the VM placement algorithm to prevent threats.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe how monitoring works in a cloud infrastructure
    identify how to protect data, apps, and infrastructure quickly with built-in security services in Azure
    recognize ways to perform monitoring in GCP
    recognize cloud infrastructure security flaws
    identify the common risks in security infrastructure
    list common techniques for tackling threats
  • list Azure cloud tools
    describe how to protect your services against denial of service and web attacks
    use Google Cloud Security Scanner you automatically scan App Engine, Compute Engine, and Google Kubernetes Engine apps for common vulnerabilities
    describe how the VM placement algorithm works
    describe how to implement threat prevention mechanisms using VM placement algorithm
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 56s
    UP NEXT
  • Playable
    2. 
    Cloud Monitoring
    7m 58s
  • Locked
    3. 
    Using Built-in Security Information in Azure
    4m 20s
  • Locked
    4. 
    Monitoring Cloud Infrastructure Security in GCP
    6m 36s
  • Locked
    5. 
    Common Types of Vulnerabilities
    11m 57s
  • Locked
    6. 
    Common Security Vulnerabilities
    15m 36s
  • Locked
    7. 
    Combating Threats
    8m 57s
  • Locked
    8. 
    Tools to Combat Threats in Azure
    7m 25s
  • Locked
    9. 
    Google Cloud Armor - Defending Your Services
    6m 7s
  • Locked
    10. 
    Cloud Security Scanner
    7m 21s
  • Locked
    11. 
    VM Placement Algorithm
    6m 50s
  • Locked
    12. 
    Preventing Threats with the VM Placement Algorithm
    3m 11s
  • Locked
    13. 
    Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.