Securing CloudOps Deployments: Security Standards for Multi-cloud

CloudOps    |    Intermediate
  • 12 videos | 1h 8m 8s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Securing multi-cloud deployments and CloudOps platforms involves managing the security and privacy of your cloud services. In this course, you'll explore the key principles and strategies for securing the enterprise cloud, recommended practices and models for perimeter security, and how to choose appropriate security mechanisms. You'll examine the configurable options for security mechanisms on both service and client side, the prominent intrusion detection techniques for managing cloud computing and security challenges, and prominent cloud audit methods. Next, you'll learn approaches for overcoming the impacts of security challenges in multi-cloud environments, best practices for improving the security of multi-cloud deployments, and how to secure CloudOps platforms to build secure pipelines, middleware, and infrastructure for multi-cloud applications. Finally, you'll explore issues a cloud architect should consider when designing cloud solutions and cloud service consumers should evaluate and manage the security and privacy of cloud services.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the key principles and strategies for securing the enterprise cloud
    Describe recommended practices and models for perimeter security that can help enterprises develop consistent and effective approaches to cloud security
    Recall the role and characteristics of a cloud security framework and classify the key cloud audit methods
    Specify the appropriate choices for security mechanisms and recognize options that need to be configured for security mechanisms on both the service and client side
    Recognize prominent intrusion detection techniques that are used to manage cloud computing and security challenges
  • Recall approaches that can be adopted to overcome the impacts of security challenges in multi-cloud environments
    Identify security challenges that need to be considered when using multiple cloud providers and recognize best practices that enterprises can adopt to significantly improve the security of multi-cloud deployments
    Recognize approaches of securing cloudops platforms that can help in building secure pipelines, middleware, and infrastructure for multi-cloud applications
    Recall security issues of public, private, and hybrid cloud models that need to be considered by cloud architects when designing cloud solutions
    Specify the steps that cloud service customers should take to evaluate and manage the security and privacy of the cloud services from the perspective of mitigating risks and delivering the appropriate level of support
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
  • 6m 33s
    Upon completion of this video, you will be able to recognize the key principles and strategies for securing enterprise cloud. FREE ACCESS
  • Locked
    3.  Models for Perimeter Security
    6m 46s
    Upon completion of this video, you will be able to describe recommended practices and models for perimeter security that can help enterprises develop consistent and effective approaches to cloud security. FREE ACCESS
  • Locked
    4.  Cloud Security Frameworks
    7m 7s
    Upon completion of this video, you will be able to recall the role and characteristics of a cloud security framework and classify the key cloud audit methods. FREE ACCESS
  • Locked
    5.  Security Mechanisms for Server and Client
    7m 13s
    After completing this video, you will be able to specify the appropriate choices for security mechanisms and recognize options that need to be configured for security mechanisms on both the service and client side. FREE ACCESS
  • Locked
    6.  Intrusion Detection Techniques
    6m 24s
    Upon completion of this video, you will be able to recognize prominent intrusion detection techniques that are used to manage cloud computing and security challenges. FREE ACCESS
  • Locked
    7.  Security Challenges in Multi-cloud Environments
    4m 53s
    After completing this video, you will be able to recall approaches that can be adopted to overcome the impacts of security challenges in multi-cloud environments. FREE ACCESS
  • Locked
    8.  Multi-cloud Deployment Security
    5m 53s
    During this video, you will learn how to identify security challenges that need to be considered when using multiple cloud providers and recognize best practices that enterprises can adopt to significantly improve the security of multi-cloud deployments. FREE ACCESS
  • Locked
    9.  Securing CloudOps Platforms
    6m 16s
    After completing this video, you will be able to recognize approaches for securing CloudOps platforms that can help in building secure pipelines, middleware, and infrastructure for multi-cloud applications. FREE ACCESS
  • Locked
    10.  Designing Secure Cloud Solutions
    6m 8s
    After completing this video, you will be able to recall security issues of public, private, and hybrid cloud models that need to be considered by cloud architects when designing cloud solutions. FREE ACCESS
  • Locked
    11.  Evaluating Security and Risk Mitigation
    8m
    After completing this video, you will be able to specify the steps that cloud service customers should take to evaluate and manage the security and privacy of the cloud services from the perspective of mitigating risks and delivering the appropriate level of support. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 45s
    67f9f4e6-40e0-4b7e-91fc-1e4752f173fb FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 33 users Rating 4.6 of 33 users (33)
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 761 users Rating 4.4 of 761 users (761)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)