Cloud Security Management: Platform & Infrastructure Security

Cloud Security    |    Intermediate
  • 8 videos | 49m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 8 users Rating 4.6 of 8 users (8)
The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe network functionality and technologies
    List the key regulations used to protect datacenter facilities
    Define identification, authentication, and authorization for resources
  • Recognize the different types of storage in aws
    Describe countermeasure strategies including uptime automation of controls and access controls
    Define configuration and data life cycle automation
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 48s
  • 2m 38s
    Upon completion of this video, you will be able to describe network functionality and technologies. FREE ACCESS
  • Locked
    3.  Physical and Environmental Protections
    12m 51s
    Upon completion of this video, you will be able to list the key regulations used to protect data center facilities. FREE ACCESS
  • Locked
    4.  Virtualization System Controls
    6m 23s
    During this video, you will learn how to identify, authenticate, and authorize resources. FREE ACCESS
  • Locked
    5.  Storage in the Cloud
    2m 30s
    After completing this video, you will be able to recognize the different types of storage available in AWS. FREE ACCESS
  • Locked
    6.  Cloud Countermeasure Strategies
    11m 47s
    After completing this video, you will be able to describe countermeasure strategies including automation of controls and access controls. FREE ACCESS
  • Locked
    7.  System and Communication Protection
    10m 55s
    In this video, find out how to define configuration and data life cycle automation. FREE ACCESS
  • Locked
    8.  Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 164 users Rating 4.5 of 164 users (164)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.4 of 189 users Rating 4.4 of 189 users (189)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 66 users Rating 4.6 of 66 users (66)
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)
Rating 4.6 of 206 users Rating 4.6 of 206 users (206)