Security Configurations & Compliance Controls

  • 12 Videos | 1h 31m 32s
  • Includes Assessment
  • Earns a Badge
Likes 24 Likes 24
The most prevalent concern with cloud computing is the question of security. Let’s explore technologies used to secure cloud resources. In this course, you will see how to create a trustworthy cloud, use Public Key Infrastructure and tunneling protocols. See how to harden security for the cloud, based on cloud models. Examine cloud access control, authorization, authentication, and identification technologies. Study how to manage the account lifecycle in the cloud, and how to configure cloud policy settings. As a scenario exercise, you will identify which areas need enhanced security policies and their preferred solutions.

WHAT YOU WILL LEARN

  • recognize the qualities of a well defined cloud security policy
    specify how to secure a cloud infrastructure using certificate-based technologies
    compare different tunneling protocols that can be used to connect to a cloud environment securely
    identify the different techniques used reduce the vulnerabilities of the resources in a cloud environment
    describe the different security issues that are dependent upon the cloud service and deployment models
    choose the appropriate authentication technology to identify users connecting to the cloud
  • compare different access control options available to cloud administrators
    choose the correct level of access to use to secure cloud resources
    configure authorization of cloud resources
    identify the correct processing techniques for ensuring safety of cloud user accounts
    configure account settings in a cloud environment for best security
    choose the correct security settings to apply in the cloud to meet business needs

IN THIS COURSE

  • Playable
    1. 
    Creating a Trustworthy Cloud
    7m 54s
    UP NEXT
  • Playable
    2. 
    Public Key Infrastructure and the Cloud
    7m 40s
  • Locked
    3. 
    Tunneling Protocols to Cloud Resources
    8m 37s
  • Locked
    4. 
    Security Hardening and the Cloud
    7m 20s
  • Locked
    5. 
    Security Choices Based on Cloud Models
    8m 59s
  • Locked
    6. 
    Cloud Identification and Authentication
    7m 35s
  • Locked
    7. 
    Cloud Access Control Methods
    6m 45s
  • Locked
    8. 
    Authorizing Access to Cloud Objects
    5m 21s
  • Locked
    9. 
    Secure Cloud Resources
    6m 4s
  • Locked
    10. 
    Managing the Account Life Cycle in the Cloud
    8m 6s
  • Locked
    11. 
    Configuring Cloud Policy Settings
    8m 9s
  • Locked
    12. 
    Exercise: Locking Down a Cloud Environment
    3m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 32 Likes 32  
Likes 226 Likes 226  
Likes 36 Likes 36