Security Configurations & Compliance Controls

Intermediate
  • 12 videos | 1h 26m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 76 users Rating 4.6 of 76 users (76)
The most prevalent concern with cloud computing is the question of security. Let's explore technologies used to secure cloud resources. In this course, you will see how to create a trustworthy cloud, use Public Key Infrastructure and tunneling protocols. See how to harden security for the cloud, based on cloud models. Examine cloud access control, authorization, authentication, and identification technologies. Study how to manage the account lifecycle in the cloud, and how to configure cloud policy settings. As a scenario exercise, you will identify which areas need enhanced security policies and their preferred solutions.

WHAT YOU WILL LEARN

  • Recognize the qualities of a well defined cloud security policy
    Specify how to secure a cloud infrastructure using certificate-based technologies
    Compare different tunneling protocols that can be used to connect to a cloud environment securely
    Identify the different techniques used reduce the vulnerabilities of the resources in a cloud environment
    Describe the different security issues that are dependent upon the cloud service and deployment models
    Choose the appropriate authentication technology to identify users connecting to the cloud
  • Compare different access control options available to cloud administrators
    Choose the correct level of access to use to secure cloud resources
    Configure authorization of cloud resources
    Identify the correct processing techniques for ensuring safety of cloud user accounts
    Configure account settings in a cloud environment for best security
    Choose the correct security settings to apply in the cloud to meet business needs

IN THIS COURSE

  • 7m 54s
    After completing this video, you will be able to recognize the qualities of a well-defined cloud security policy. FREE ACCESS
  • 7m 40s
    Upon completion of this video, you will be able to specify how to secure a cloud infrastructure using certificate-based technologies. FREE ACCESS
  • Locked
    3.  Tunneling Protocols to Cloud Resources
    8m 37s
    In this video, you will compare different tunneling protocols that can be used to connect to a cloud environment securely. FREE ACCESS
  • Locked
    4.  Security Hardening and the Cloud
    7m 20s
    During this video, you will learn how to identify the different techniques used to reduce the vulnerabilities of the resources in a cloud environment. FREE ACCESS
  • Locked
    5.  Security Choices Based on Cloud Models
    8m 59s
    After completing this video, you will be able to describe the different security issues that depend on the cloud service and deployment models. FREE ACCESS
  • Locked
    6.  Cloud Identification and Authentication
    7m 35s
    Find out how to choose the appropriate authentication technology to identify users connecting to the cloud. FREE ACCESS
  • Locked
    7.  Cloud Access Control Methods
    6m 45s
    During this video, you will learn how to compare different access control options available to cloud administrators. FREE ACCESS
  • Locked
    8.  Authorizing Access to Cloud Objects
    5m 21s
    During this video, you will learn how to choose the correct level of access to use to secure cloud resources. FREE ACCESS
  • Locked
    9.  Secure Cloud Resources
    6m 4s
    In this video, you will configure authorization for cloud resources. FREE ACCESS
  • Locked
    10.  Managing the Account Life Cycle in the Cloud
    8m 6s
    Learn how to identify the correct processing techniques for ensuring the safety of cloud user accounts. FREE ACCESS
  • Locked
    11.  Configuring Cloud Policy Settings
    8m 9s
    In this video, find out how to configure account settings for best security in a cloud environment. FREE ACCESS
  • Locked
    12.  Exercise: Locking Down a Cloud Environment
    3m 31s
    Learn how to choose the correct security settings to apply in the cloud to meet business needs. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.3 of 43 users Rating 4.3 of 43 users (43)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 3 users Rating 4.3 of 3 users (3)
Rating 4.5 of 28 users Rating 4.5 of 28 users (28)
Rating 4.6 of 7019 users Rating 4.6 of 7019 users (7019)