Cloud Security Fundamentals: Cloud Infrastructure Security

Cloud Security
  • 12 Videos | 1h 4m 36s
  • Includes Assessment
  • Earns a Badge
Likes 84 Likes 84
Learners discover how to secure the Cloud Solution Provider (CSP) account from the outset by using best practices and techniques, in this 11-video course. Other infrastructure security concepts such as Integrated Access Manager (IAM), network access control lists (NACLs), firewalls, and web application firewalls (WAFs) are also covered. Begin by learning about designing and planning security controls to ensure adequate protection of resources. Then explore practical aspects of dealing with a cloud service provider and securing the root account, or billing account. The next tutorial focuses on IAM groups and users, which leads into examining IAM policies and permissions. You will learn how to define IAM roles; explore secure management access; and define network access control lists. Learn about secure management access and Secure Shell (SSH) and transport layer security (TLS). Learn how to define NACLs; configure stateful firewalls (which track connections and automatically allow returning traffic) in the cloud; and describe WAFs. In the final tutorial, discover best practices for hardening virtual machines. The concluding exercise asks learners to describe cloud infrastructure security.

WHAT YOU WILL LEARN

  • design and plan security controls
    secure the root account
    configure IAM groups and users
    describe IAM policies and permissions
    define IAM roles
    secure management access
  • define network access control lists
    configure stateful firewalls in the cloud
    describe web application firewalls
    describe best practices for hardening VMs
    describe cloud infrastructure security

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 21s
    UP NEXT
  • Playable
    2. 
    Design and Plan Security Controls
    5m 27s
  • Locked
    3. 
    Secure the Root Account
    5m 27s
  • Locked
    4. 
    Identity and Access Management Groups and Users
    5m 31s
  • Locked
    5. 
    IAM Policies and Permissions
    7m 25s
  • Locked
    6. 
    IAM Roles
    5m 7s
  • Locked
    7. 
    Secure Management Access
    7m 49s
  • Locked
    8. 
    Network Access Control Lists
    3m 27s
  • Locked
    9. 
    Stateful Firewalls in the Cloud
    4m 15s
  • Locked
    10. 
    Web Application Firewalls
    7m 54s
  • Locked
    11. 
    Best Practices for Hardening VMs
    4m 27s
  • Locked
    12. 
    Exercise: Describing Cloud Infrastructure Security
    1m 27s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 48 Likes 48  
Likes 103 Likes 103  
Likes 161 Likes 161