Security Configurations & Compliance Controls
Intermediate
- 12 Videos | 1h 26m 2s
- Includes Assessment
- Earns a Badge
The most prevalent concern with cloud computing is the question of security. Let's explore technologies used to secure cloud resources. In this course, you will see how to create a trustworthy cloud, use Public Key Infrastructure and tunneling protocols. See how to harden security for the cloud, based on cloud models. Examine cloud access control, authorization, authentication, and identification technologies. Study how to manage the account lifecycle in the cloud, and how to configure cloud policy settings. As a scenario exercise, you will identify which areas need enhanced security policies and their preferred solutions.
WHAT YOU WILL LEARN
-
recognize the qualities of a well defined cloud security policyspecify how to secure a cloud infrastructure using certificate-based technologiescompare different tunneling protocols that can be used to connect to a cloud environment securelyidentify the different techniques used reduce the vulnerabilities of the resources in a cloud environmentdescribe the different security issues that are dependent upon the cloud service and deployment modelschoose the appropriate authentication technology to identify users connecting to the cloud
-
compare different access control options available to cloud administratorschoose the correct level of access to use to secure cloud resourcesconfigure authorization of cloud resourcesidentify the correct processing techniques for ensuring safety of cloud user accountsconfigure account settings in a cloud environment for best securitychoose the correct security settings to apply in the cloud to meet business needs
IN THIS COURSE
-
1.Creating a Trustworthy Cloud7m 54sUP NEXT
-
2.Public Key Infrastructure and the Cloud7m 40s
-
3.Tunneling Protocols to Cloud Resources8m 37s
-
4.Security Hardening and the Cloud7m 20s
-
5.Security Choices Based on Cloud Models8m 59s
-
6.Cloud Identification and Authentication7m 35s
-
7.Cloud Access Control Methods6m 45s
-
8.Authorizing Access to Cloud Objects5m 21s
-
9.Secure Cloud Resources6m 4s
-
10.Managing the Account Life Cycle in the Cloud8m 6s
-
11.Configuring Cloud Policy Settings8m 9s
-
12.Exercise: Locking Down a Cloud Environment3m 31s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.