Final Exam: Security Admin
- 1 Video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Admin will test your knowledge and application of the topics presented throughout the Security Admin track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
WHAT YOU WILL LEARN
describe security base parameters and recall what creates baselinesidentify various design concepts including logical and physical designIdentify cloud model types and their approach towards adopting the modeldescribe cloud administration and managementdescribe audit and compliance keeping services stacks in minddescribe the importance of encryption in and out of clouddefine the integration of security services as a service or offeringrecognize the core architecture of cloud and importance to data securityidentify the building blocks of security planning designing and Infrastructure developmentdescribe identity access control including details on authentication and authorizationdefine internal and external audit and identify various types of audits and audit scopelist the key features of dynamic clusters, storage maintenance, and HA on cloudlist the best practices to communicate with vendors, partners, and customersidentify common stake holders and governance challenges and how to coordinate communication with themdescribe the evolution of cloud including hardware, software, and server virtualizationidentify the importance if open-source in cloud infrastructureperform excellent grain queries to get selective access controllist the common legislation conflicts and compliance issuesdescribe the risk management process in logical and physical infrastructuresclassify different types of web services including CAAS, IAAS, MAAS, PAAS, and SAASrecognize the risks and threats involved in cloud computing and their analysisdefine patch management, performance monitoring, and backupcreate a maintenance plan using orchestration unitscreate business continuity plan and work on its implementationlist the importance of encryption and key managementuse secure deployment practices to develop and secure cloud applicationspecify how to provide security on cloud keeping track of limitations including vulnerability of infrastructure, platform, and serviceidentify the importance of control over physical security and assetsrecognize the concepts of data handling, hardware, software and breach planning, and secure environmentdescribe how security policy implementation mitigates cloud security challenges
identify the software development life cycle and issuesdescribe supply chain risk, CSA CCM, ISO 28000:2007list the best practices for servers, storage network, and virtual switchesspecify the need for cloud datacenterdevelop a maintenance plan using orchestration unitsdescribe the software development life cycle and issuesrecognize the e-discovery processidentify various techniques including Crypto, tokenization, data masking, and dipissue excellent grain queries to get selective access controlcategorize different types of web services including CAAS, IAAS, MAAS, PAAS, and SAASapply BCDR planning in various scenariosdefine data outsourcing and how to prevent loss of control on dataidentify cloud software security measures including security principles and testingidentify the different service provider risks including back door spoofingcompare the privacy and information systemsDescribe information security and how to manage operationsdescribe the standards, such as Internal ISMS, ISO 27001:2013describe the business high availability and continuity techniquesrecall the importance of control over physical security and assetsdescribe cloud under compliance and the need to comply with the attesting bodiesdescribe how to secure network operations including network isolation, clans, TLS, DNS, and IPSecdescribe the life cycle of securing data in the cloudrecognize the concepts relates to contract management and its key componentsdefine deceptive information and how to protect datadescribe deceptive information and how to protect datadescribe DRM, different data protection policies, and event handing including SIEMrecognize the importance of control over physical security and assetsdescribe how to secure SAAS cloud by focusing on SAAS applicationsdescribe the data protection guidelines including ISO/IEC 27015:2015, 27002, and EU data protectiondefine risk profile, appetite, and risk management
IN THIS COURSE
1.Security Admin33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.