Final Exam: Network Security Specialist

Intermediate
  • 1 Video | 32s
  • Includes Assessment
  • Earns a Badge
Likes 8 Likes 8
Final Exam: Network Security Specialist will test your knowledge and application of the topics presented throughout the Network Security Specialist track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.

WHAT YOU WILL LEARN

  • describe key legal considerations when moving to the cloud
    list the importance of performing a cost-benefit analysis
    list requirements for business continuity strategy
    recognize factors that can impact confidentiality, integrity, and availability of cloud data
    describe challenges introduced by different types of cloud platforms such as public, private, hybrid, and community
    differentiate between physical and logical infrastructure for cloud operations
    recognize challenges of cloud service such as IaaS, PaaS, SaaS
    describe common cryptographic protocols
    describe virtualization technologies
    define shared responsibility
    configure stateful firewalls in the cloud
    describe the three-tier design model
    describe common cloud vulnerabilities such as negligence, cyber threats, and system vulnerabilities
    define the basics of risk management
    use audit processes and methodologies in the cloud
    list network security concepts such data and media sanitization
    list common clouds infrastructure components such as network, virtualization, and computer
    describe the SaaS cloud service model
    describe web application firewalls
    secure management access
    define object storage security
    define file and database security
    design and plan security controls
    describe cloud computing definitions and roles
    describe considerations when using the PaaS cloud service model
    classify key management services
    use verified secure software
    describe common development lifecycles
    describe software assurance and validation
    compare client and server-side encryption
  • list data security strategies such as encryption and key management
    define training and awareness security
    list potential threats against cloud computing infrastructure
    differentiate between data ownership and data custody
    describe the benefits of cloud offerings such as AWS and Azure
    apply the secure software development lifecycle
    list specifics about cloud application architecture such as supplementary security components, cryptography, and sandboxing
    recognize considerations related to cloud management
    differentiate between cloud computing roles such as cloud service customer, cloud service architect, and cloud auditor
    differentiate between on-premise and cloud implementations
    describe the common deployment and migration strategies
    describe compute technologies
    provide an overview of the IaaS cloud service model
    list virtualization security concepts such as hypervisor and container security
    recognize considerations when moving applications to the cloud
    define IAM roles
    describe storage technologies
    recognize key access control considerations
    ensure compliance with regulations and controls, like ITIL and ISO/IEC 20000-1
    describe key cloud characteristics
    recognize how to implement operational controls and standards
    recognize different privacy concerns such as private data and jurisdictional concerns
    specify cloud benefits, components, and service models
    secure the root account
    manage compliance with regulations and controls
    describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
    describe considerations when evaluating cloud service providers
    recognize requirements for disaster recovery strategy
    define privacy issues and jurisdiction
    describe legal requirements and risks

IN THIS COURSE

  • Playable
    1. 
    Network Security Specialist
    33s
    UP NEXT

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.