Securing CloudOps Deployments: Implementing Multi-cloud Security
CloudOps
| Intermediate
- 12 videos | 55m 53s
- Includes Assessment
- Earns a Badge
Azure, AWS, and Google Cloud Platform provide various security services to secure access, applications, data, infrastructures, and deployments in the cloud. In this course, you'll explore the security services provided by AWS Cloud Security for securing workloads and applications, as well as the Azure security products that can be used to protect data, applications, and infrastructures. You'll explore the Google Security Model, the security services provided by Google, why you need to secure containers, and recommended cloud container security best practices for securing container usage in the cloud. You'll move on to learn about how configure AWS Security Hub, create and configure symmetric and asymmetric keys using AWS KMS, and implement Azure Active Directory and Seamless Single Sign-On. Finally, you'll examine how to set up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform, harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine, and how to encrypt Kubernetes secrets at the application layer.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecall AWS Cloud Security services and features that can be used to secure workloads and applications in the cloudconfigure AWS Security Hub to automate security checks, manage security findings, and identify the highest priority security issues across AWS environmentscreate and configure symmetric and asymmetric keys using AWS KMS to control encryption across AWSlist the security products provided by Azure that can be used to protect data, applications, and infrastructure when implementing layered security and defense in depth strategies across identity, data, hosts, and networksimplement Azure Active Directory and Seamless Single Sign-On to automatically sign in users
-
recognize the Google Security Model and Google services that can be used to fulfil the security, policy, and regulatory compliance requirements of cloud deploymentsset up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platformrecognize the need for securing containers and recommended cloud container security best practices to consider when securing container usage in the cloudharden security and restrict network access to the control plane and nodes of Google Kubernetes Engineencrypt Kubernetes Secrets at the application layer using keys that are managed in Cloud Key Management Servicesummarize the key concepts covered in this course
IN THIS COURSE
-
1m 23s
-
7m 50s
-
6m 8s
-
5m 16s
-
4m 50s
-
3m 28s
-
5m 40s
-
5m 38s
-
5m 21s
-
5m 13s
-
3m 8s
-
1m 58s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.