CompTIA Cloud Essentials+: Security Considerations

CompTIA Cloud Essentials+    |    Intermediate
  • 15 Videos | 1h 33m 27s
  • Includes Assessment
  • Earns a Badge
Following secure cloud service design principles is a client consumer's top priority. Applying defense-in-depth principles and using cloud service provider security enablers can help achieve this. You'll start this course by examining the cloud service security taxonomy, identity and access management in cloud environments, authentication mechanisms provided by cloud platforms, and the components of an IAM strategy in the cloud. Next, you'll investigate the benefits of single sign-on, the prominent types of multi-factor authentication (MFA), and the fundamental design principles of federation. You'll then examine the Cloud Federation Reference Architecture. Moving on, you'll recognize common cloud deployment and enterprise data center security practices. You'll use Active Directory Federation Services to implement federated authentication, manage access to AWS resources, and enable virtual MFA devices for IAM users in public cloud. You can use this course in preparation for the CompTIA Cloud Essentials+ (CLO-002) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    list the types of security challenges applicable to cloud computing services and the main security objectives to consider when securing services for cloud computing
    specify the taxonomy of cloud service security and describe the comparative analysis used to differentiate aspects of cloud environment identity and access management mechanisms
    recall the critical authentication mechanisms provided by cloud platforms that control access to cloud services
    describe the key characteristics of a standard IAM strategy along with the key components involved in defining an IAM strategy for the cloud
    specify the concept of and benefits associated with single sign-on
    recall the concept of multi-factor authentication and list the features of the prominent multi-factor authentication types
    recognize the fundamental design principles of federation and the characteristics of the Cloud Federation Reference Architecture, which captures the fundamental aspects of federated authentication and authorization
  • implement federated authentication with the Active Directory Federation Services and AWS
    create and manage AWS users and groups using AWS IAM and use permissions to allow and deny their access to AWS resources
    enable a virtual multi-factor authentication device for an IAM user in public cloud
    list security standards, map them to various security categories, and describe the status that helps identify the appropriate standards for a security maturity model
    recall the governmental and industry regulatory requirements that enterprises need to fulfil to adhere to policies and regulations
    describe the common security practices followed in an enterprise data center and in cloud deployment models
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 48s
    UP NEXT
  • Playable
    2. 
    Cloud Computing Security Challenges and Objectives
    8m 10s
  • Locked
    3. 
    Cloud Service Security Taxonomy
    7m 29s
  • Locked
    4. 
    Authentication Mechanisms in the Cloud
    9m 18s
  • Locked
    5. 
    IAM Strategy for the Cloud
    6m 10s
  • Locked
    6. 
    Single Sign-on (SSO) Fundamentals
    6m 16s
  • Locked
    7. 
    Prominent Multi-factor Authentication Types
    5m 35s
  • Locked
    8. 
    Principles and Architecture of Federation
    6m 28s
  • Locked
    9. 
    Implementing Federation Using AWS
    3m 13s
  • Locked
    10. 
    Using IAM to Set Users, Groups, and Permissions
    6m 41s
  • Locked
    11. 
    Implementing IAM User Multi-factor Authentication
    3m 37s
  • Locked
    12. 
    Mapping Security Standards and Categories
    8m 5s
  • Locked
    13. 
    Governmental and Industry Regulatory Requirements
    6m 15s
  • Locked
    14. 
    Security Practices in Cloud Deployment Models
    5m 39s
  • Locked
    15. 
    Course Summary
    2m 12s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE