Cloud Security Administration: Hardened Cloud Security

Cloud Security    |    Beginner
  • 10 videos | 45m 25s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 59 users Rating 4.6 of 59 users (59)
An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software. In this course, you'll learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to harden physical hosts and help reduce the attack surface by using a virtual guest
    Identify the importance of control over physical security and assets
    Define data outsourcing and how to prevent loss of control on data
    Specify how to provide cloud security while keeping track of limitations including vulnerability of infrastructure, platform, and service
  • Define deceptive information and how to protect data
    Recognize the importance of encrypted queries and protecting personal data
    Differentiate between privacy and information systems
    Describe the life cycle of securing data in cloud
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
  • 5m 42s
    Upon completion of this video, you will be able to describe how to harden physical hosts and reduce the attack surface by using a virtual guest. FREE ACCESS
  • Locked
    3.  Physical Security
    6m 5s
    In this video, you will learn about the importance of controlling physical security and assets. FREE ACCESS
  • Locked
    4.  Data Confidentiality
    4m 56s
    In this video, you will learn about data outsourcing and how to prevent loss of control over your data. FREE ACCESS
  • Locked
    5.  Vulnerability Analysis
    6m 44s
    After completing this video, you will be able to specify how to provide cloud security while keeping track of limitations including vulnerability of infrastructure, platform, and service. FREE ACCESS
  • Locked
    6.  Security Decoys and Techniques
    5m 23s
    In this video, you will learn about how to identify and protect yourself from deceptive information. FREE ACCESS
  • Locked
    7.  Secure Query Execution
    3m 56s
    After completing this video, you will be able to recognize the importance of encrypted queries and protecting personal data. FREE ACCESS
  • Locked
    8.  Privacy and Information Systems
    6m 12s
    Find out how to differentiate between privacy and information security. FREE ACCESS
  • Locked
    9.  Data and Media Sanitization
    3m 53s
    Upon completion of this video, you will be able to describe the life cycle of securing data in the cloud. FREE ACCESS
  • Locked
    10.  Course Summary
    46s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 119 users Rating 4.5 of 119 users (119)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.5 of 6 users Rating 4.5 of 6 users (6)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.4 of 135 users Rating 4.4 of 135 users (135)
Rating 4.7 of 25 users Rating 4.7 of 25 users (25)