Final Exam: Security Admin
1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Admin will test your knowledge and application of the topics presented throughout the Security Admin track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
WHAT YOU WILL LEARN
apply BCDR planning in various scenarioscategorize different types of web services including CAAS, IAAS, MAAS, PAAS, and SAASclassify different types of web services including CAAS, IAAS, MAAS, PAAS, and SAAScompare the privacy and information systemscreate a maintenance plan using orchestration unitscreate business continuity plan and work on its implementationdefine data outsourcing and how to prevent loss of control on datadefine deceptive information and how to protect datadefine internal and external audit and identify various types of audits and audit scopedefine patch management, performance monitoring, and backupdefine risk profile, appetite, and risk managementdefine the integration of security services as a service or offeringdescribe audit and compliance keeping services stacks in minddescribe cloud administration and managementdescribe cloud under compliance and the need to comply with the attesting bodiesdescribe deceptive information and how to protect datadescribe DRM, different data protection policies, and event handing including SIEMdescribe how security policy implementation mitigates cloud security challengesdescribe how to secure network operations including network isolation, clans, TLS, DNS, and IPSecdescribe how to secure SAAS cloud by focusing on SAAS applicationsdescribe identity access control including details on authentication and authorizationDescribe information security and how to manage operationsdescribe security base parameters and recall what creates baselinesdescribe supply chain risk, CSA CCM, ISO 28000:2007describe the business high availability and continuity techniquesdescribe the data protection guidelines including ISO/IEC 27015:2015, 27002, and EU data protectiondescribe the evolution of cloud including hardware, software, and server virtualizationdescribe the importance of encryption in and out of clouddescribe the life cycle of securing data in the clouddescribe the risk management process in logical and physical infrastructures
describe the software development life cycle and issuesdescribe the standards, such as Internal ISMS, ISO 27001:2013develop a maintenance plan using orchestration unitsIdentify cloud model types and their approach towards adopting the modelidentify cloud software security measures including security principles and testingidentify common stake holders and governance challenges and how to coordinate communication with themidentify the building blocks of security planning designing and Infrastructure developmentidentify the different service provider risks including back door spoofingidentify the importance if open-source in cloud infrastructureidentify the importance of control over physical security and assetsidentify the software development life cycle and issuesidentify various design concepts including logical and physical designidentify various techniques including Crypto, tokenization, data masking, and dipissue excellent grain queries to get selective access controllist the best practices for servers, storage network, and virtual switcheslist the best practices to communicate with vendors, partners, and customerslist the common legislation conflicts and compliance issueslist the importance of encryption and key managementlist the key features of dynamic clusters, storage maintenance, and HA on cloudperform excellent grain queries to get selective access controlrecall the importance of control over physical security and assetsrecognize the concepts of data handling, hardware, software and breach planning, and secure environmentrecognize the concepts relates to contract management and its key componentsrecognize the core architecture of cloud and importance to data securityrecognize the e-discovery processrecognize the importance of control over physical security and assetsrecognize the risks and threats involved in cloud computing and their analysisspecify how to provide security on cloud keeping track of limitations including vulnerability of infrastructure, platform, and servicespecify the need for cloud datacenteruse secure deployment practices to develop and secure cloud application
IN THIS COURSE
1.Security Admin33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.