Security Configurations & Compliance Controls

Intermediate
  • 12 Videos | 1h 31m 32s
  • Includes Assessment
  • Earns a Badge
Likes 34 Likes 34
The most prevalent concern with cloud computing is the question of security. Let’s explore technologies used to secure cloud resources. In this course, you will see how to create a trustworthy cloud, use Public Key Infrastructure and tunneling protocols. See how to harden security for the cloud, based on cloud models. Examine cloud access control, authorization, authentication, and identification technologies. Study how to manage the account lifecycle in the cloud, and how to configure cloud policy settings. As a scenario exercise, you will identify which areas need enhanced security policies and their preferred solutions.

WHAT YOU WILL LEARN

  • recognize the qualities of a well defined cloud security policy
    specify how to secure a cloud infrastructure using certificate-based technologies
    compare different tunneling protocols that can be used to connect to a cloud environment securely
    identify the different techniques used reduce the vulnerabilities of the resources in a cloud environment
    describe the different security issues that are dependent upon the cloud service and deployment models
    choose the appropriate authentication technology to identify users connecting to the cloud
  • compare different access control options available to cloud administrators
    choose the correct level of access to use to secure cloud resources
    configure authorization of cloud resources
    identify the correct processing techniques for ensuring safety of cloud user accounts
    configure account settings in a cloud environment for best security
    choose the correct security settings to apply in the cloud to meet business needs

IN THIS COURSE

  • Playable
    1. 
    Creating a Trustworthy Cloud
    7m 54s
    UP NEXT
  • Playable
    2. 
    Public Key Infrastructure and the Cloud
    7m 40s
  • Locked
    3. 
    Tunneling Protocols to Cloud Resources
    8m 37s
  • Locked
    4. 
    Security Hardening and the Cloud
    7m 20s
  • Locked
    5. 
    Security Choices Based on Cloud Models
    8m 59s
  • Locked
    6. 
    Cloud Identification and Authentication
    7m 35s
  • Locked
    7. 
    Cloud Access Control Methods
    6m 45s
  • Locked
    8. 
    Authorizing Access to Cloud Objects
    5m 21s
  • Locked
    9. 
    Secure Cloud Resources
    6m 4s
  • Locked
    10. 
    Managing the Account Life Cycle in the Cloud
    8m 6s
  • Locked
    11. 
    Configuring Cloud Policy Settings
    8m 9s
  • Locked
    12. 
    Exercise: Locking Down a Cloud Environment
    3m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 84 Likes 84  
Likes 46 Likes 46  
Likes 362 Likes 362