Aspire Journeys

Cyber Specialist to CCSP

  • 84 Courses | 77h 54m 40s
  • 6 Labs | 62h
  • Includes Test Prep
Your organization has moved to cloud - how will you secure it? Move into a Cloud Security Professional role and learn how protect your data, applications, and infrastructure while allowing higher availability by mitigating attacks. This journey supports both CompTIA's Cloud+ certification and ISC(2)'s CCSP certification. This journey includes: On-demand content, Instructor-led training, challenges, exam prep, live mentoring, and additional books/resources

In this track of the Cyber Specialist to CCSP journey, the focus will be on designing and deploying a security architecture. You will learn how to integrate security policies across network, application, information, and access control architectures as well as cloud and hybrid cloud models. You will review and implement industry standard best practices and policies (NIST, etc.), along with standard architecture framework models.

This track includes instructor-led training and on-demand content.

  • 4 Courses | 3h 4m 24s

 

In this track of the Cyber Specialist to CCSP journey, the focus will be on designing and deploying a security architecture. You will learn how to integrate security policies across network, application, information, and access control architectures as well as cloud and hybrid cloud models. You will review and implement industry standard best practices and policies (NIST, etc.), along with standard architecture framework models.

This track includes on-demand content.

  • 6 Courses | 4h 58m 25s

In this track of the Cyber Specialist to CCSP journey, the focus will be on current laws and regulations that drive the creation of a governance system of rules, practices, and processes by which a company is directed and controlled.

This track includes Instructor-led training and on-demand content.

  • 3 Courses | 2h 21m 17s

In this track of the Cyber Specialist to CCSP journey, the focus will be on current laws and regulations that drive the creation of a governance system of rules, practices, and processes by which a company is directed and controlled. This track includes Instructor-led training and on-demand content.

This track includes on-demand content.

  • 6 Courses | 4h 48m 24s

In this track of the Cyber Specialist to CCSP journey, you will develop cloud computing skills to enable you to move IT workloads to the cloud and integrate products and services from different providers and industries. The focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors.

This track includes instructor-led training, on-demand content, a practice lab and practice test.

  • 6 Courses | 7h 42m 56s
  • 1 Lab | 28h 45m

In this track of the Cyber Specialist to CCSP journey, you will develop cloud computing skills to enable you to move IT workloads to the cloud and integrate products and services from different providers and industries. The focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors.

This track includes on-demand content, a practice lab and practice test.

  • 20 Courses | 25h 11m 12s
  • 1 Lab | 28h 45m

In this track of the Cyber Specialist to CCSP journey, you will learn to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. 

This track includes instructor-led training, on-demand content, challenges, and practice tests.

  • 4 Courses | 3h 20m 34s
  • 2 Labs | 2h 15m

In this track of the Cyber Specialist to CCSP journey, you will learn to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. 

This track includes on-demand content, challenges, and practice tests.

  • 19 Courses | 12h 39m 6s
  • 2 Labs | 2h 15m

In this track of the Cyber Specialist to CCSP journey, you will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments.  You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.

This track includes instructor-led training, on-demand content, and a practice test.

  • 5 Courses | 4h 37m 33s

In this track of the Cyber Specialist to CCSP journey, you will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments.  You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.

This track includes on-demand content, and a practice test.

  • 11 Courses | 9h 10m 49s

COURSES INCLUDED

Frameworks, Life Cycles, and Architecture
Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. In this course, you'll learn about common IT life cycles and life cycle management, including the system development and security life cycles. You'll explore the importance of frameworks, including enterprise architecture frameworks. You'll then examine various stakeholders and the roles they play in architecture development. Next, you'll learn about the need for and types of security policies. Finally, you'll explore aspects of secure network architecture design, including network segmentation and components, applying industry best practices, and team member roles and responsibilities.
12 videos | 43m has Assessment available Badge
Secure Application and Data Architecture Design
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.
20 videos | 55m has Assessment available Badge
Access Control and Security Architecture Design
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.
13 videos | 46m has Assessment available Badge
Security Architecture Documentation and Alternative Architectures
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.
12 videos | 38m has Assessment available Badge

COURSES INCLUDED

Frameworks, Life Cycles, and Architecture
Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. In this course, you'll learn about common IT life cycles and life cycle management, including the system development and security life cycles. You'll explore the importance of frameworks, including enterprise architecture frameworks. You'll then examine various stakeholders and the roles they play in architecture development. Next, you'll learn about the need for and types of security policies. Finally, you'll explore aspects of secure network architecture design, including network segmentation and components, applying industry best practices, and team member roles and responsibilities.
12 videos | 43m has Assessment available Badge
Secure Application and Data Architecture Design
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.
20 videos | 55m has Assessment available Badge
Access Control and Security Architecture Design
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.
13 videos | 46m has Assessment available Badge
Security Architecture Documentation and Alternative Architectures
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.
12 videos | 38m has Assessment available Badge
Cybersecurity and Networking Fundamentals
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
13 videos | 42m has Assessment available Badge
Getting Started with Security Architecture
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
19 videos | 1h 11m has Assessment available Badge

COURSES INCLUDED

Governance, Risk Management, and Compliance
In this course, you'll explore governance, risk management, and compliance - commonly known as GRC. You'll examine why it matters, what it is, and its increasing importance. You'll learn about who needs it and the role it plays for various parties. Next, you'll examine industry compliance, external authorities, non-compliance consequences, and reporting. You'll also learn about industry standards like PCI, laws and regulations, and compliance and company policy. Finally, you'll complete this course by learning about privacy compliance, including private data, how data architectures address privacy information, the Health Insurance Portability and Accountability Act, the Health Information Technology for Economic and Clinical Health act, the Gramm-Leach-Bliley Act, the General Data Protection Regulation, and privacy best practices.
13 videos | 1h 16m has Assessment available Badge
Risk Assessment and Management
Risk assessment allows you to identify and prioritize risk, while risk management allows you to analyze, mitigate, or accept risk. In this course, you'll explore risk assessment and management. You'll begin by examining the role Business Impact Analysis plays in risk management and what it accomplishes, before moving on to learn about various risk assessment and analysis approaches. Next, you'll explore the importance of risk mitigation and having a strategy for it, as well as how risk mitigation strategies fit into the risk management effort. You'll learn about the NIST SP 800-37 risk management framework and the steps involved, as well as the Risk Maturity Model and the associated five levels of risk management competency. Finally, you'll explore ongoing risk management, including what causes risk responses and acceptance to change, and the importance of patch management.
8 videos | 43m has Assessment available Badge
Governance and Corporate Culture
Corporate culture relates to the enterprise-wide attitudes towards security and risk. In this course, you'll learn about governance and corporate culture. First, you'll explore corporate security culture and associated concerns, before moving on to look at the concept of fear, uncertainty, and doubt and why it should be avoided. Next, you'll examine why enterprise-wide support is required, the differences between top-down and bottom-up, and various security roles. You'll learn about the importance of having an acceptable use policy, consequences of not having an appropriate policy in place, and having consequences for individuals who violate this policy. Finally, you'll examine methods of improving corporate culture and governance, like training, rewards and consequences, and hiring practices, and also learn about the importance of ongoing assessments.
5 videos | 21m has Assessment available Badge

COURSES INCLUDED

Governance, Risk Management, and Compliance
In this course, you'll explore governance, risk management, and compliance - commonly known as GRC. You'll examine why it matters, what it is, and its increasing importance. You'll learn about who needs it and the role it plays for various parties. Next, you'll examine industry compliance, external authorities, non-compliance consequences, and reporting. You'll also learn about industry standards like PCI, laws and regulations, and compliance and company policy. Finally, you'll complete this course by learning about privacy compliance, including private data, how data architectures address privacy information, the Health Insurance Portability and Accountability Act, the Health Information Technology for Economic and Clinical Health act, the Gramm-Leach-Bliley Act, the General Data Protection Regulation, and privacy best practices.
13 videos | 1h 16m has Assessment available Badge
Risk Assessment and Management
Risk assessment allows you to identify and prioritize risk, while risk management allows you to analyze, mitigate, or accept risk. In this course, you'll explore risk assessment and management. You'll begin by examining the role Business Impact Analysis plays in risk management and what it accomplishes, before moving on to learn about various risk assessment and analysis approaches. Next, you'll explore the importance of risk mitigation and having a strategy for it, as well as how risk mitigation strategies fit into the risk management effort. You'll learn about the NIST SP 800-37 risk management framework and the steps involved, as well as the Risk Maturity Model and the associated five levels of risk management competency. Finally, you'll explore ongoing risk management, including what causes risk responses and acceptance to change, and the importance of patch management.
8 videos | 43m has Assessment available Badge
Governance and Corporate Culture
Corporate culture relates to the enterprise-wide attitudes towards security and risk. In this course, you'll learn about governance and corporate culture. First, you'll explore corporate security culture and associated concerns, before moving on to look at the concept of fear, uncertainty, and doubt and why it should be avoided. Next, you'll examine why enterprise-wide support is required, the differences between top-down and bottom-up, and various security roles. You'll learn about the importance of having an acceptable use policy, consequences of not having an appropriate policy in place, and having consequences for individuals who violate this policy. Finally, you'll examine methods of improving corporate culture and governance, like training, rewards and consequences, and hiring practices, and also learn about the importance of ongoing assessments.
5 videos | 21m has Assessment available Badge
Security Program Regulatory Integration
In this 12-video course, learners will discover the importance of integrating regulations with organizational security policies. Explore security standards such as General Data Protection Regulation (GDPR); Health Insurance Portability and Accountability (HIPAA); and Federal Information Security Management Act (FISMA), as well as the International Organization for Standardization (ISO), and National Institute of Standard and Technology (NIST). To begin, determine how to establish the importance of building regulatory compliance into a company's IT security program. You will then examine Personally Identifiable Information (PII), and Protected Health Information (PHI). This leads into the subject of Payment Card Industry Data Security Standard (PCI DSS), and what it entails. You will learn how HIPAA protects medical information; how GDPR protects European Union citizen data, and how the Gramm-Leach-Bliley Act (GLBA), applies to financial institutions. You will also identify how FISMA strives to protect sensitive US Government information, and recognize both NIST and ISO security standards. To conclude the course, you will discover how the Sarbanes-Oxley Act (SOX), requires organizational financial transparency.
12 videos | 38m has Assessment available Badge
Risk Analysis: Security Risk Management
In this 14-video course, learners can explore security risk management concepts and discover how to assess, categorize, monitor, and respond to organizational risks. Examine key terms such as threats, vulnerabilities, impacts, and risks, and the steps involved in the National Institute of Standard and Technology (NIST), risk management framework (RMF). Begin by learning how risk relates to information systems, and look at the concepts of managing risks, differentiating between threats, vulnerabilities, impacts, and risks. Examine the first step of the NIST RMF, categorizing risk, and then the second RMF step, selecting security controls. Next, observe the third step, implementing security controls; the fourth step, assessing security control effectiveness; the fifth step, examining risk, and output of security controls assessment to determine whether or not the risk is acceptable; and the last step, monitoring controls. Recognize benefits of a control-focused risk management approach; the benefits of an event-focused risk management approach; and risk communication. Finally, explore risk response and remediation, and differentiating between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk.
14 videos | 38m has Assessment available Badge
Policy & Governance: Incident Response
Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.
14 videos | 1h 9m has Assessment available Badge

COURSES INCLUDED

CompTIA Cloud+: Cloud Architecture & Models
The cloud has various deployment and service models that can help your organization design and create your very own cloud strategy based on needs. First, you'll learn about the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. Next, you'll examine cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such as the Internet of Things, serverless computing, machine learning, artificial intelligence, and the shared responsibility model. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 10m has Assessment available Badge
CompTIA Cloud+ : Cloud High Availability & Scaling
High availability of cloud systems and resources is extremely important to ensure that a system is there when you need it. Cloud environments have many options and features to ensure that the goal of high availability is achieved. First, you will learn the concepts of affinity and anti-affinity and how it related to hypervisors. Next, you will learn about the benefits of oversubscription of compute, network and storage resources, using regions and zones, cloud applications, and using containers in the cloud environment. Next, you will learn how to configure network resources such as switches, routers, load balancers, and firewalls for high availability. Finally, you will learn about using cloud clusters, identifying single points of failure, and the benefits of using auto-scaling, horizontal scaling, vertical scaling and cloud bursting. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Solution Design
Developing new software systems can be costly and time consuming. Cloud-based solutions can help get your system online quickly and cost-effectively and help to meet all your business requirements. In this course, you'll learn how to analyze the cloud solution design in support of business requirements. First, you'll explore how to analyze the solution design while considering requirements for software, hardware, system integration, security, network, disaster recovery, budgeting, service level agreements, and compliance. Next, you'll learn about the benefits of using multiple environments for development, quality assurance, staging, and production. You'll also examine the advantages of performing blue-green deployments. Finally, you'll learn about software development testing techniques such as performance, regression, functional, usability, vulnerability, and penetration testing. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Network Security
Having a secure cloud environment is crucial for ensuring system and data integrity and security. Cloud environments have numerous methods for meeting these security needs. In this course, you'll learn how to secure a network in a cloud environment using network segmentation, network protocols, and network services. Next, you'll learn how to monitor the security of a network environment using log and event monitoring and how to harden the network environment. Then, you'll move on to examine the available network security tools that can be used to perform network penetration tests, such as vulnerability scanners and port scanners. You'll also explore how to use these security tools to perform vulnerability assessments. Finally, you'll learn about the purpose of a risk register and how to prioritize the deployment and installation of security patches. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
13 videos | 1h 21m has Assessment available Badge
CompTIA Cloud+: Cloud Network Deployments
Deploying cloud-based solutions efficiently and securely requires that the network be configured correctly. In this course, you'll learn about the network services that need to be considered when deploying cloud solutions. First, you'll explore the role of network services such as DHCP, DNS, CDN, IPAM, as well as VPNs. You'll learn about the features of virtual routing including dynamic and static routing. Next, you'll examine virtual network interface controllers and the features of network appliances such as load balancers, firewalls, and virtual private clouds. Finally, you'll learn about the features of virtual LANs, single root input/output virtualization, and software-defined networks. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 18m has Assessment available Badge
CompTIA Cloud+: Cloud Disaster Recovery
Planning for disaster recovery is crucial to getting your cloud solution running and operational when a crisis occurs. In this course, you'll learn about how to plan for and the features of disaster recovery. First, you'll explore disaster recovery features such as failover, failback, backup restoration, and replication. Next, you'll examine the importance of network configuration, geographical data centers, restoration methods, and on-premise and cloud sites. Finally, you'll learn about the importance of the DR kit, playbook, network diagrams, RPOs, RTOs, SLAs, and corporate guidelines when planning for disaster recovery. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 26m has Assessment available Badge

COURSES INCLUDED

CompTIA Cloud+: Cloud Architecture & Models
The cloud has various deployment and service models that can help your organization design and create your very own cloud strategy based on needs. First, you'll learn about the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. Next, you'll examine cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such as the Internet of Things, serverless computing, machine learning, artificial intelligence, and the shared responsibility model. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 10m has Assessment available Badge
CompTIA Cloud+: Cloud Capacity Planning
Capacity planning is an important factor to consider when creating a Cloud Strategy. This course will describe the important factors to consider when performing capacity planning. First, you will learn about the technical and business factors to consider when performing capacity planning. Next, you will learn about using standard templates, licensing considerations, user density and system load. You then learn how to use captured metrics to perform trend analysis and how to do performance capacity planning. Finally, you'll learn how to create a cloud-based database and how cloud features can be scaled to meet capacity demands. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 8m has Assessment available Badge
CompTIA Cloud+ : Cloud High Availability & Scaling
High availability of cloud systems and resources is extremely important to ensure that a system is there when you need it. Cloud environments have many options and features to ensure that the goal of high availability is achieved. First, you will learn the concepts of affinity and anti-affinity and how it related to hypervisors. Next, you will learn about the benefits of oversubscription of compute, network and storage resources, using regions and zones, cloud applications, and using containers in the cloud environment. Next, you will learn how to configure network resources such as switches, routers, load balancers, and firewalls for high availability. Finally, you will learn about using cloud clusters, identifying single points of failure, and the benefits of using auto-scaling, horizontal scaling, vertical scaling and cloud bursting. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Solution Design
Developing new software systems can be costly and time consuming. Cloud-based solutions can help get your system online quickly and cost-effectively and help to meet all your business requirements. In this course, you'll learn how to analyze the cloud solution design in support of business requirements. First, you'll explore how to analyze the solution design while considering requirements for software, hardware, system integration, security, network, disaster recovery, budgeting, service level agreements, and compliance. Next, you'll learn about the benefits of using multiple environments for development, quality assurance, staging, and production. You'll also examine the advantages of performing blue-green deployments. Finally, you'll learn about software development testing techniques such as performance, regression, functional, usability, vulnerability, and penetration testing. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Identity & Access Management
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 13m has Assessment available Badge
CompTIA Cloud+: Cloud Network Security
Having a secure cloud environment is crucial for ensuring system and data integrity and security. Cloud environments have numerous methods for meeting these security needs. In this course, you'll learn how to secure a network in a cloud environment using network segmentation, network protocols, and network services. Next, you'll learn how to monitor the security of a network environment using log and event monitoring and how to harden the network environment. Then, you'll move on to examine the available network security tools that can be used to perform network penetration tests, such as vulnerability scanners and port scanners. You'll also explore how to use these security tools to perform vulnerability assessments. Finally, you'll learn about the purpose of a risk register and how to prioritize the deployment and installation of security patches. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
13 videos | 1h 21m has Assessment available Badge
CompTIA Cloud+: Cloud Security Controls
Ensuring the security of your operating systems and applications is a key component of keeping your cloud environment secure. There are several key steps that can be taken to ensure your cloud system is secure. In this course, you will learn about cloud security policies and managing cloud user permissions. Next, you will learn about anti-virus and anti-malware tools, firewalls, intrusion detection and intrusion prevention tools that can be used to detect and prevent cybersecurity attacks. Next, you will learn about hardening your cloud environment and using encryption to increase data security. Finally, you will learn about configuration management and how to monitor the system and event logs. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 9m has Assessment available Badge
CompTIA Cloud+: Data Security & Compliance Controls
There may be several ramifications for failing to secure your organization's data in the cloud environment. This could also mean failing to comply with regulatory compliances. In this course, you will learn how mandatory access controls are used to secure cloud services. First, you will learn encryption, hashing algorithms, digital signatures, the access security broker and file integrity monitoring can be used to ensure data security and regulatory compliance. Next, you will learn how data classification, network and access control can be used to secure data. Next, you will learn about data security laws and regulations and the legal requirements for securely storing data. Finally, you will learn about data loss prevention and the components of records management systems including versioning, retention, destruction and write once/read many. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 17m has Assessment available Badge
CompTIA Cloud+: Cloud Component Integration
Cloud environments provide many key components that can be incorporated into your cloud solution. In this course, you'll learn about the available cloud components. First, you'll learn about subscription services such as file, communication, e-mail, VoIP, messaging and collaboration, and the virtual desktop infrastructure, as well as directory and identity services. Next, you'll explore cloud service models such as IaaS, PaaS, and SaaS and how to provision and integrate compute, storage, and network resources for a cloud solution. Next, you'll examine how to integrate serverless applications, deploy and integrate virtual machines, and use OS and solution templates to provision and integrate resources into a cloud solution. Finally, you'll learn to integrate identity management and containers and perform autoscaling and post-deployment validation of cloud solutions. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 10m has Assessment available Badge
CompTIA Cloud+: Provisioning Cloud Storage
Storage in the cloud is a crucial component of any cloud-based solution. In this course, you'll learn about the types of cloud storage you can use in your solutions and their features. First, you'll explore how to provision and measure the performance of block, file, object, and flash storage. Next, you'll learn about the different types of RAID arrays and the purpose of user quotas. You'll then move on to examine the protocols used with cloud storage. You'll learn about the features of hyperconverged storage, hyperconverged infrastructures, and software-defined storage. Finally, you'll explore how to create and use an Azure container. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 23m has Assessment available Badge
CompTIA Cloud+: Cloud Network Deployments
Deploying cloud-based solutions efficiently and securely requires that the network be configured correctly. In this course, you'll learn about the network services that need to be considered when deploying cloud solutions. First, you'll explore the role of network services such as DHCP, DNS, CDN, IPAM, as well as VPNs. You'll learn about the features of virtual routing including dynamic and static routing. Next, you'll examine virtual network interface controllers and the features of network appliances such as load balancers, firewalls, and virtual private clouds. Finally, you'll learn about the features of virtual LANs, single root input/output virtualization, and software-defined networks. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 18m has Assessment available Badge
CompTIA Cloud+: Cloud Migrations
For a cloud-based solution to run efficiently and cost-effectively, the appropriate sizing of resources is essential. In this course, you'll learn to configure the correct compute sizing for a deployment, as well as how to perform cloud migrations. First, you'll explore the features of virtualization such as hypervisors and how to compute. Next, you'll learn about the features of and how to correctly size CPUs, vCPUs, and GPUs. You'll explore memory allocation and the features of a hyperconverged infrastructure. You'll then learn about cloud migrations such as storage migrations, database migrations, physical to virtual migrations, virtual to virtual migrations, and cloud-to-cloud migrations. Finally, you'll examine cloud migration implications for access control lists, firewalls, and vendor lock-in. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 7m has Assessment available Badge
CompTIA Cloud+: Cloud Logging, Monitoring, Alerting & Optimization
Logging and monitoring is essential to ensure that your cloud environment is running efficiently and securely. In this course, you will learn to configure logging, monitoring and alerting services in the cloud and optimize cloud environments. First, you will learn about the available cloud features for logging such as collectors, SNMP, syslog, audits, log types, access and authentication, and automation. Next, you will learn about the features of system monitoring such as baselines, thresholds, tagging, and performance monitoring, resource utilization, availability, and SLA-defined uptime. Next, you will learn about the features of alerting such as common messaging methods, maintenance mode and appropriate responses. Finally, you will learn how to optimize cloud resources including placement, computing, storage, networks, and device drivers and firmware. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h has Assessment available Badge
CompTIA Cloud+: Cloud Operations Management
Maintaining a stable cloud environment is important to ensure the health of the cloud system. In this course you will learn how to maintain efficient operation of a cloud environment. First, you will learn how to perform life cycle management, and perform change management. Next, you will learn about the configuration management database and why it is important. Next, you will learn about using dashboards and the impacts of process improvements, upgrade methods, and performance reporting. Lastly, you will learn about the options for performing patching and the types of backups and available backup objects, and to confirm the completion of backups. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 16m has Assessment available Badge
CompTIA Cloud+: Cloud Automation & Orchestration
In order for cloud environments to operate efficiently you need to use automation and orchestration to keep things running smoothly. In this course, you will learn about the components and features of cloud automation and orchestration. First, you will learn about the features of infrastructure as code, continuous integration and continuous deployment. Next, you will learn about version control and configuration management and how it relates to orchestration and automation. Next, you will learn about the features of containers, cloud automation activities, secure scripting and orchestration sequencing. Finally, you will learn about backup and restore policies as well as backup targets. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 8m has Assessment available Badge
CompTIA Cloud+: Cloud Disaster Recovery
Planning for disaster recovery is crucial to getting your cloud solution running and operational when a crisis occurs. In this course, you'll learn about how to plan for and the features of disaster recovery. First, you'll explore disaster recovery features such as failover, failback, backup restoration, and replication. Next, you'll examine the importance of network configuration, geographical data centers, restoration methods, and on-premise and cloud sites. Finally, you'll learn about the importance of the DR kit, playbook, network diagrams, RPOs, RTOs, SLAs, and corporate guidelines when planning for disaster recovery. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 26m has Assessment available Badge
CompTIA Cloud+: Cloud Troubleshooting Methodologies
Being able to troubleshoot cloud and network issues is important when trying to resolve failures or operational difficulties. In this course, you'll learn to use troubleshooting methodologies to resolve common cloud issues. First, you'll examine how to resolve cloud related issues using the troubleshooting methodology. Next, you'll explore how to resolve network security group misconfigurations issues and network connectivity issues. You'll then move on to learn about resolving network routing and firewall connectivity issues. You'll learn about the tools that you can use to troubleshoot and resolve network issues. Finally, you'll learn resource utilization, application performance, and load balancing performance tuning. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 22m has Assessment available Badge
CompTIA Cloud+: Troubleshooting Cloud Security Issues
Being able to troubleshoot security issues is essential to ensuring fully functional systems in the cloud. In this course, you'll examine some of the common causes of security issues. First, you'll learn to troubleshoot security issues due to missing or incomplete privileges, authentication or authorization issues, or network and directory security group issues. Next, you'll explore how to troubleshoot security issues due to expired, revoked, compromised, or misconfigured keys and certificates or due to misconfigured or misapplied policies. You'll then move on to learn how to troubleshoot and identify security concerns due to unencrypted data, data breaches, misclassification of data, lack of protocol encryption, and insecure ciphers. Finally, you'll also learn to troubleshoot and identify security concerns due to exposed endpoints, misconfigured security appliances, and unsupported protocols, as well as how to deal with internal or external attacks. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 12m has Assessment available Badge
CompTIA Cloud+: Troubleshooting Cloud Deployments
Being able to troubleshoot issues during the deployment process is essential to ensuring full functionality in the cloud. In this course, you'll examine some of the common causes of deployment issues. First, you'll learn about some of the causes of service outages and the need for a disaster recovery plan. You'll explore how to troubleshoot performance and degradation issues and how these issues can relate to capacity planning. Next, you'll learn how automation scripts can be the cause of deployment issues and how good scripts validate and perform rollbacks on failure. You'll then move on to examine how to troubleshoot issues with applications in containers, how to validate deployment templates, and how insufficient resource capacity can cause degradation and latency issues. Finally, you'll learn how to troubleshoot licensing and vendor-related issues. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 28m has Assessment available Badge
CompTIA Cloud+: Troubleshooting Automation and Orchestration Issues
Being able to troubleshoot issues during cloud automation and orchestration is important to ensuring smooth and efficient deployments in a cloud environment. In this course you will examine some of the causes of these issues. First, you'll explore automation and orchestration issues that occur due to user account or service account permission issues, change management process miscommunications, and DNS and server name changes. Next, you'll learn about automation and orchestration issues that occur due to IP address scheme changes, changed availability zones, third-party versioning issues, and tool incompatibility issues. Finally, you'll examine how to validate change management processes and that patches installed correctly. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos | 1h 7m has Assessment available Badge

COURSES INCLUDED

Microsoft Azure Security Technologies: Azure Storage Account Security
This 18-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring several methods available to improve Azure storage account security and encrypt cloud data, and demonstrating how to use VM (virtual machine) disks. You will examine ways to harden Azure storage accounts; how to control storage account container access using access policies; and what is encrypted by default. Next, learners will observe how to use RBAC (role-based access control) to control resource access in a cloud computing environment. You will then learn how to configure custom encryption keys. This course examines the soft delete feature within an Azure storage account for blobs and binary large objects, which is not enabled by default. Next, learn to regenerate storage account keys in the portal, in PowerShell, and using the CLI (command-line interface). You will learn to use shared access signatures in Azure Storage Explorer, and to configure access policies for storage queues. Finally, learn to configure VM disk encryption by using PowerShell.
18 videos | 54m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Database Security
Explore Azure database security and the available mechanisms designed to protect data in this 17-video course, which helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, examine characteristics of the Azure SQL Database, a DBaaS (database as a service), offered in the Azure cloud and the NoSQL database Azure Cosmos DB. Then learn to protect sensitive data with data masking, and how to enable geofencing. Learners will next examine how security is managed in Azure Data Lake, and how to analyze data stored in the data lake. You will learn to work with several Azure SQL database security mechanisms, including the always-encrypted option, column security, auditing, and SQL backups. Then you will learn how to enable SQL Geo-Replication and use the CLI (command-line interface) to manage SQL Replication. Finally, examine when to use SQL failover groups, and how to restore SQL data by using the portal, PowerShell, and the CLI.
17 videos | 50m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD Connect
This 10-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring how to configure and use Azure AD Connect to link an on-premises Active Directory with Azure Active Directory. You will examine how Azure AD Connect allows on-premises user credentials to be used for Cloud app authorization. Learners will observe how to modify the Azure AD Connect configuration, and examine both Azure AD Connect and SSO (Seamless Sign-On). Then you will learn how to enable SSO, and to configure an Azure AD custom domain. This course examines different SSO methods, including OpenID Connect and OAuth, to allow user access to on-premises and cloud apps. Learners will examine other tools in AD Connect, including the Azure AD Synchronization Service Manager, and how to force AD sync by using the Synchronization Manager, and you will learn how to sync with PowerShell. Finally, you will learn how to use the Azure AD Connect built-in troubleshooting tool to detect issues that might arise.
10 videos | 30m has Assessment available Badge
Microsoft Azure Security Technologies: Network Security
Learners will discover how virtual networks (VNets) can be used to isolate Azure cloud resources and how network security groups (NSGs) allow or deny traffic to or from subnets and virtual machine (VM) network interfaces, in this 17-video course, helping prepare for AZ-500 Microsoft Azure Security Technologies certification exam. The course examines use of Secure Shell (SSH) for managing Linux, remote desktop protocol (RDP) for managing Windows, and jump boxes as central, publicly accessible administrative points. Begin the course by creating an Azure VNet using the graphical user interface (GUI), the command-line interface (CLI), and using PowerShell. Next, an overview of NSGs, and how they can allow or deny network traffic. Create an NSG by using the GUI, the CLI, and using PowerShell. Remotely manage Linux VMs with both SSH and RDP. Deploy a jump box remote management point. Explore how Azure Firewall is used, configure Azure Firewall network rules, application rules, and network address translation (NAT) rules. Finally, learn how to configure a route table entry so that traffic is sent to Azure Firewall.
17 videos | 1h 5m has Assessment available Badge

COURSES INCLUDED

Microsoft Azure Security Technologies: Azure Storage Account Security
This 18-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring several methods available to improve Azure storage account security and encrypt cloud data, and demonstrating how to use VM (virtual machine) disks. You will examine ways to harden Azure storage accounts; how to control storage account container access using access policies; and what is encrypted by default. Next, learners will observe how to use RBAC (role-based access control) to control resource access in a cloud computing environment. You will then learn how to configure custom encryption keys. This course examines the soft delete feature within an Azure storage account for blobs and binary large objects, which is not enabled by default. Next, learn to regenerate storage account keys in the portal, in PowerShell, and using the CLI (command-line interface). You will learn to use shared access signatures in Azure Storage Explorer, and to configure access policies for storage queues. Finally, learn to configure VM disk encryption by using PowerShell.
18 videos | 54m has Assessment available Badge
Microsoft Azure Security Technologies: Data Classification
This 17-video course explores how to organize and secure sensitive data by using data classification, as part of preparations for AZ-500 Microsoft Azure Security Technologies certification exam. First, learners will examine the PCI-DSS (Payment Card Industry Data Security Standard), and laws and regulations of the European Union GDPR (General Data Protection Regulation), and HIPAA (Health Insurance Portability and Accountability Act) to protect data. You will examine how to add tags to Microsoft Azure cloud resources in the Azure portal GUI (graphical user interface), and with PowerShell. Next, learn how DLP (data loss prevention) is used to control sensitive data. You will install AIP (Azure Information Protection) client, and learn to add labels to your data to organize it for security purposes. This course demonstrates how to use AIP in MS Word. You will learn to view protected data statistics. Finally, you will learn how to configure blob lifecycle settings, and blob container policies by using the portal.
17 videos | 53m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Database Security
Explore Azure database security and the available mechanisms designed to protect data in this 17-video course, which helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, examine characteristics of the Azure SQL Database, a DBaaS (database as a service), offered in the Azure cloud and the NoSQL database Azure Cosmos DB. Then learn to protect sensitive data with data masking, and how to enable geofencing. Learners will next examine how security is managed in Azure Data Lake, and how to analyze data stored in the data lake. You will learn to work with several Azure SQL database security mechanisms, including the always-encrypted option, column security, auditing, and SQL backups. Then you will learn how to enable SQL Geo-Replication and use the CLI (command-line interface) to manage SQL Replication. Finally, examine when to use SQL failover groups, and how to restore SQL data by using the portal, PowerShell, and the CLI.
17 videos | 50m has Assessment available Badge
Microsoft Azure Security Technologies: Database User Access
This 14-video course explores Azure database user access management, SQL threat detection, and how to enable SQL threat policies, while helping prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, you will learn to use SQL and Azure AD (Active Directory) logins to authenticate Azure SQL deployments, and create SQL logins. You will learn how to use SQL Server Management Studio to connect to Azure SQL and how to enable RBAC (role-based access control) for Azure AD administration by using the GUI (graphical user interface), CLI (command-line interface), and PowerShell. You will learn to configure the Azure SQL Firewall, and to configure custom keys for Azure SQL TDE (transparent data encryption). This course then demonstrates how to conduct a SQL vulnerability assessment to determine security shortcomings. You will examine Advanced Threat Detection, and how to configure threat detection settings at the Azure SQL Server level and at individual database level. Finally, learn to enable threat policies by using CLI and PowerShell.
14 videos | 46m has Assessment available Badge
Microsoft Azure Security Technologies: Identity & Access Management
In this 16-video course, learners can prepare for AZ-500 Microsoft Azure Security Technologies certification exam by exploring Azure AD (Active Directory), and how to use it as a secure identity store to control resource access. You will learn how Azure uses identities in AD; how to create a new Azure AD tenant for identity isolation; and how to switch between tenants and manage them. This course examines the function of PIM (privileged identity management), and Azure AD Access review to analyze permissions, manage group memberships, and access to applications. Next, you will learn how to configure and use Azure AD Identity Protection to detect suspicious activity related to user accounts, and how to identify the relationship between subscriptions and tenants. Then learners examine how to use Azure AD Conditional Access to enhance Azure AD security, and how to configure Conditional Access policies. You will learn how to register apps in Azure AD, and to manage Azure AD Principles. Finally, the course discusses how OAuth 2.0 is used for Resource Authorization.
16 videos | 51m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD Connect
This 10-video course helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam by exploring how to configure and use Azure AD Connect to link an on-premises Active Directory with Azure Active Directory. You will examine how Azure AD Connect allows on-premises user credentials to be used for Cloud app authorization. Learners will observe how to modify the Azure AD Connect configuration, and examine both Azure AD Connect and SSO (Seamless Sign-On). Then you will learn how to enable SSO, and to configure an Azure AD custom domain. This course examines different SSO methods, including OpenID Connect and OAuth, to allow user access to on-premises and cloud apps. Learners will examine other tools in AD Connect, including the Azure AD Synchronization Service Manager, and how to force AD sync by using the Synchronization Manager, and you will learn how to sync with PowerShell. Finally, you will learn how to use the Azure AD Connect built-in troubleshooting tool to detect issues that might arise.
10 videos | 30m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD User Management
Learners can explore numerous methods for creating, securing, and managing Azure AD user credentials in this 16-video course, which helps prepare learners for AZ-500 Microsoft Azure Security Technologies certification exam. First, you will learn how to enable MFA (multifactor authentication) for some or all Azure AD users to enhance user sign-in security, and learn to configure SSPR (self-service password reset). Next, examine how SSPR allows users to reset their own forgotten passwords, and how password lockout settings prevent brute-force attacks against Azure AD user accounts. Learners will be shown how to create an Azure AD guest user, and how to perform a bulk import to create multiple users at once. You will learn to use the Azure AD portal to enable admin MFA, as well as MFA for individual users, and how to sign in as an MFA enabled user. Finally, you will learn how to use PowerShell and CLI (command-line interface) to manage Azure AD users.
16 videos | 44m has Assessment available Badge
Microsoft Azure Security Technologies: Azure AD Group Management
In this 10-video course, which helps prepare learners AZ-500 Microsoft Azure Security Technologies certification exam, you can explore several methods for creating and managing Azure Active Directory groups. Learners will observe how to use the Azure AD portal to create a static Azure AD group, and to assignment membership to a static group manually. Then you will learn how to configure a static Azure group by using PowerShell to perform standard group management functions, including adding members to or deleting members from a group. Next, examine how to create a dynamic Azure AD group, which determines group membership on the basis of attributes. You will learn how to enable SSGP (Self-Service Management Group) to allow cloud members to provision and deprovision cloud resources. Continue the course by learning how enable owners of groups to determine who may join the group. Finally, you will learn how to manage Azure AD groups by using the CLI (command-line interface).
10 videos | 24m has Assessment available Badge
Microsoft Azure Security Technologies: Network Security
Learners will discover how virtual networks (VNets) can be used to isolate Azure cloud resources and how network security groups (NSGs) allow or deny traffic to or from subnets and virtual machine (VM) network interfaces, in this 17-video course, helping prepare for AZ-500 Microsoft Azure Security Technologies certification exam. The course examines use of Secure Shell (SSH) for managing Linux, remote desktop protocol (RDP) for managing Windows, and jump boxes as central, publicly accessible administrative points. Begin the course by creating an Azure VNet using the graphical user interface (GUI), the command-line interface (CLI), and using PowerShell. Next, an overview of NSGs, and how they can allow or deny network traffic. Create an NSG by using the GUI, the CLI, and using PowerShell. Remotely manage Linux VMs with both SSH and RDP. Deploy a jump box remote management point. Explore how Azure Firewall is used, configure Azure Firewall network rules, application rules, and network address translation (NAT) rules. Finally, learn how to configure a route table entry so that traffic is sent to Azure Firewall.
17 videos | 1h 5m has Assessment available Badge
Microsoft Azure Security Technologies: VPNs
In this course, used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam, you will discover how VPNs provide an encrypted tunnel over the Internet from clients or on-premises networks to the Azure cloud. Explore how to configure a point-to-site or site-to-site VPN and how to connect a Windows 10 device to an Azure VPN. You will begin the 7-video course by receiving an overview of how VPNs allow secure connections to Azure. Next, you will explore how to use PowerShell to generate public key infrastructure (PKI) certificates. To take advantage of Azure VPN connectivity, you need to establish a virtual network gateway in the Azure cloud, which is a configuration that represents a VPN appliance in the Azure cloud. You will do this in order to configure both a point-to-site and site-to-site VPN. In the final tutorial, learners will discover how to connect a Windows 10 device to an Azure VPN.
7 videos | 26m has Assessment available Badge
Microsoft Azure Security Technologies: Web Application Security
Learners will discover how the design and implementation of a web app in the Azure cloud can determine its security posture in this 11-video course, used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin by learning to identify and understand the common web app security flaws. Then examine how to use the Azure portal to deploy a web application. You will explore how using custom domain names with transport layer security (TLS) bindings allows the use of a custom domain name system (DNS) domain with connectivity over HTTPS. You will learn how to configure web app authentication and how web apps can be backed up and protected by a web application firewall (WAF). You will also examine how API Gateways serve as proxies between the calling of an application programming interface (API) and the API itself and how Application Security Groups organize and protect VMs based on their running workloads.
11 videos | 34m has Assessment available Badge
Microsoft Azure Security Technologies: VM Security
In this course, learners can explore Azure VM security and hardening techniques to reduce the attack surface of Azure VMs. This 21-video course can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin with an overview of the steps taken to harden VMs. Then learn how to use roles to limit VM admin access. Next, receive an overview of Linux secure shell (SSH) public key authentication. Learn how to generate SSH keys with PuttyGen; enable SSH public key authentication for Linux VMs; and identify how to harden HDInsights; install an antimalware VM extension. Then learn to manage VM operating systems (OS) updates, and enable VM backup. Next, learn to enable VM inventory and change tracking; enable VM replication to a secondary region; deploy a VM scale set, execute built-in VM run commands, and execute custom VM run commands. View effective VM network security group (NSG) security rules; restore an Azure VM; recognize the steps for restoring files; use the portal to view VM Inventory, and to execute a VM test fallover.
21 videos | 1h 2m has Assessment available Badge
Microsoft Azure Security Technologies: Application Containers
Discover how application containers isolate app files and settings from the operating system (OS) and other apps in this 8-video course. You will also explore how containers can be secured in similar ways to app workloads, including how to apply updates and provide limited access, as part of preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. To begin, learners will examine how application containers can provide app isolation on different networks, and explore how to harden application containers to improve their security posture. Next, learners will take a look at Azure Kubernetes Service (AKS) and how it provides users with container cluster services. You will then learn how to deploy an Azure Docker VM running Ubuntu, an open-source software OS that runs from the desktop. You will conclude the course by discovering how to deploy an Azure container registry, and how to push a Docker image to an Azure container registry.
8 videos | 22m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Key Vault
In this 19-video course, explore Azure key vaults and how they can contain secrets, keys, and certificates, which are used to secure other resources such as VM disks and databases. Examine the key vault access policy and how it controls access to key vault contents in this course, which can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin by learning about the purpose of Azure key vaults; recognize how cryptography secures data; identify the public key infrastructure (PKI) certificate lifecycle, and recognize how to differentiate between the secure sockets layer (SSL) and transport layer security (TLS). You will learn how to create a key vault using the graphical user interface (GUI); using the command-line interface (CLI), and using PowerShell. Learn how to configure a key vault access policy; create keys using the GUI, the CLI, and PowerShell. Also, create secrets by using the GUI, the CLI, and using PowerShell. Then move on to key vault certificate creation by using the GUI, the CLI, and PowerShell.
19 videos | 52m has Assessment available Badge
Microsoft Azure Security Technologies: Azure RBAC & Policies
In this course, discover how to use role-based access control (RBAC) to limit administrative access to Azure resources at the subscription, resource group, and resource levels. This 13-video course explores how Azure policies provide more granularity than RBAC for the deployment and management of Azure resources, in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. To start, .learners receive an overview of RBAC and how roles are used in Azure. Next, you will learn how to create a custom RBAC role and manage RBAC by using the graphical user interface (GUI), using the command-line interface (CLI), and using PowerShell. Identify how policies are used in Azure; configure policies by using the GUI, and using PowerShell. Then explore how to build your own custom Azure policies that you can apply to a subscription or resource group. Take a look at resource locking and the portal by locking an Azure resource by using the GUI and the CLI.
13 videos | 42m has Assessment available Badge
Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
Learners will discover how to use Log Analytic workspaces to centralize Azure resource logged data from a variety of sources and how to run log queries in this 11-video course. Prepare for the AZ-500 Microsoft Azure Security Technologies certification exam by examining how to configure Azure Monitor centralized alert and notification settings. You will begin by examining how to identify performance and security baselines and how to view and filter Azure Cloud resource activity logs. Next, learn how to create a Log Analytics workspace, which is an Azure resource that must be configured to gain insights about activity and usage of your Azure resources. Then discover how to manage Log Analytics workspace data sources and run log queries. Take a look at using the Azure monitor tool in the portal, in order to have a centralized way of monitoring a variety of aspects of your Azure environment. Then learn about Azure monitor network packet capturing, and capturing Azure VM network traffic; create an action group, and finally, explore how to configure alert notifications.
11 videos | 36m has Assessment available Badge
Microsoft Azure Security Technologies: Azure Security Center
In this 7-video course, you will explore how recommendations from the Azure Security Center, which automatically collects resource security metrics, can be used to improve Azure resource security. You will also examine how playbooks can remediate security issues and can be triggered by alerts. This course can be used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam. Begin the course by navigating the Azure Security Center, which has a wealth of security-related information that is specific to the Azure computing environment. Next, examine how to view Azure Security Center security alerts. Then, learners will take a look at Azure Security Center playbooks and learn how to manage both Security Center policies and regulatory compliance, which is an important aspect of cloud computing. You will also discover how to configure just-in-time virtual machine access. In the final tutorial in the course, learners will explore file integrity monitoring and how to enable it.
7 videos | 19m has Assessment available Badge
Microsoft Azure Security Technologies: Review Course 1
In this 18-video course, learners can explore various techniques for securely implementing and managing Azure resources, while preparing for the AZ-500 Microsoft Azure Security Technologies Certification exam, focusing on security engineers' abilities. Security must be considered when designing, implementing, managing, and monitoring Microsoft Azure usage. In this course, you will examine how to control admin access to storage accounts, how to use custom keys to encrypt cloud data, and how to use a shared access signature to limit storage account access. The course then demonstrates how to use a storage account key for access; how to secure sensitive data by using Azure Information Protection (AIP); and how to organize cloud resources by using tags (cloud resource tagging). Learn about Azure partner SAS Institute, Inc., and their joint efforts. Next, watch demonstrations of how to enable database masking and replication, and how to configure a database backup and restore. Finally, learn to configure Azure SQL firewall and how to enable Azure AD Conditional Access.
9 videos | 19m has Assessment available Badge
Microsoft Azure Security Technologies: Review Course 2
In this 9-video course, learners will explore additional techniques for secure implementation and management of Azure resources, while preparing for the AZ-500 Microsoft Azure Security Technologies certification exam. You will begin the course by examining how to enable Azure AD user multifactor authentication (MFA) and how to configure password lockout. Other topics covered are virtual private networks (VPNs); Transport Layer Security (TLS); just-in-time (JIT) access; and core concepts of Azure security. Then watch a demonstration of how to create a network security group (NSG), and how to control access to virtual networks (VNets). Next, learn how to configure Azure firewall; how to configure site-to-site VPN connectivity; and how to enable web app TLS bindings. The course continues by demonstrating how to harden Azure VMs to reduce the attack surface, and how to create an Azure Key Vault. Finally, you will see how to limit resource access through Azure role-based access control or RBAC (role-based access control) as well as through Azure policies.
9 videos | 22m has Assessment available Badge

COURSES INCLUDED

CCSP 2019: Cloud System Architecture Design
Cloud services vary in size and complexity, and deployed architecture carries a direct impact on service and data asset security. In this 15-video course, learners explore aspects of cloud computing architectural design, along with associated cloud systems and components. Begin by looking at cloud component definitions and various cloud system participants: consumers, providers, partners, auditors, and regulators. Next, view operational characteristics of cloud computing: on-demand, self-service, broad network access, multi-tenancy, rapid elasticity and scalability, resource pooling, and measured service. Look at supporting architectural components and infrastructure of cloud computing such as virtualization and storage. Examine details of Cloud Computing Activities with reference to ISO/IEC 17789, clause 9. Learn how cloud service categories are based on supported services and capabilities such as application, platform, and infrastructure capability types, and examine cloud deployment categories and models. Learn about the responsibility of cloud services between customers and providers. Explore the impact of technologies such as machine learning, and examine business requirements and contracts and aspects of vendor and contract management. A final exercise covers supply chain management. This course will help a learner prepare for the (ISC)2 Certified Cloud Security Professional (CCSP) exam.
14 videos | 53m has Assessment available Badge
CCSP 2019: Secure Cloud Computing
Explore security solutions related to securing cloud-based IT systems and data including jump boxes and firewalls in this 13-video course. Discover how disaster recovery concepts such as RTO (recovery time objective) and RPO (recovery point objective) apply to the cloud. This course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Examine Internal Information Security Management and Security Control Systems, cryptography, and encryption of cloud-hosted assets. Learn about access control for cloud-hosted assets, asset removal, and storage media sanitization. Explore cloud network security issues and solutions such as firewall access control lists (ACLs). Learn how a jump box limits direct cloud virtual machine access. Capture traffic in a Microsoft Azure cloud computing environment, and deploy a Microsoft Azure Firewall. Look at security in virtualized environments, including infrastructure and data threats and platform-specific security responsibilities. Examine the security-based lifecycle of cloud-hosted assets and business continuity and disaster recovery concepts such as RTO and RPO and cloud functional security. Finally, learners view methodologies for mapping cloud service requirements to service provider certification and product certifications.
17 videos | 1h 21m has Assessment available Badge
CCSP 2019: Data Security Technologies
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.
12 videos | 36m has Assessment available Badge
CCSP 2019: Cloud Infrastructure
General categories of IT services in cloud computing include compute, storage, and networking. Explore how these services address business requirements, along with how graphical user interface (GUI) and command line tools are used to manage cloud resources. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. The key concepts in this course include: the physical aspect of a cloud platform and the related physical architecture; the networking and communication architecture of a cloud platform, including software-defined networking (SDN); how to deploy a Azure cloud virtual network; and how to understand the compute service as it applies to the cloud platform. In addition, learn how to deploy an Azure virtual machine (VM); to define storage and Storage as a Service (STaaS) within a cloud platform; and to deploy an Azure storage account. Finally, learn about cloud resources using the Azure portal; cloud resources using command line tools; and list requirements for logical design, including tenant partitioning and access control.
12 videos | 45m has Assessment available Badge
CCSP 2019: Data Center Security
Risk management ensures that realized threats have minimal impact on business operations. This 16-video course explores how security controls address security objectives, as well as the IT audit process, and how to configure high availability for cloud services. This course helps learners prepare for the Certified Cloud Security Professional exam. Key concepts covered include: risk as it applies to cloud services and underlying infrastructure, and risk analysis and management posture regarding cloud computing; integration of information security and risk management activities into a formal framework; threats and attack vectors associated with cloud services and infrastructure; and threat mitigation and attack handling techniques. Next, learn to generate an Azure storage account shared access signature, how to deploy an Azure network security group; and how to configure an Azure role-based access control (RBAC) to control virtual machine (VM) management. Finally, learn about certain auditing techniques and responsibilities and various types of audit reports. Learn how to conduct an Azure VM failover test; to deploy an Azure VM scale set; and to deploy an Azure load balancer.
16 videos | 1h has Assessment available Badge

COURSES INCLUDED

CCSP 2019: Cloud System Architecture Design
Cloud services vary in size and complexity, and deployed architecture carries a direct impact on service and data asset security. In this 15-video course, learners explore aspects of cloud computing architectural design, along with associated cloud systems and components. Begin by looking at cloud component definitions and various cloud system participants: consumers, providers, partners, auditors, and regulators. Next, view operational characteristics of cloud computing: on-demand, self-service, broad network access, multi-tenancy, rapid elasticity and scalability, resource pooling, and measured service. Look at supporting architectural components and infrastructure of cloud computing such as virtualization and storage. Examine details of Cloud Computing Activities with reference to ISO/IEC 17789, clause 9. Learn how cloud service categories are based on supported services and capabilities such as application, platform, and infrastructure capability types, and examine cloud deployment categories and models. Learn about the responsibility of cloud services between customers and providers. Explore the impact of technologies such as machine learning, and examine business requirements and contracts and aspects of vendor and contract management. A final exercise covers supply chain management. This course will help a learner prepare for the (ISC)2 Certified Cloud Security Professional (CCSP) exam.
14 videos | 53m has Assessment available Badge
CCSP 2019: Secure Cloud Computing
Explore security solutions related to securing cloud-based IT systems and data including jump boxes and firewalls in this 13-video course. Discover how disaster recovery concepts such as RTO (recovery time objective) and RPO (recovery point objective) apply to the cloud. This course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Examine Internal Information Security Management and Security Control Systems, cryptography, and encryption of cloud-hosted assets. Learn about access control for cloud-hosted assets, asset removal, and storage media sanitization. Explore cloud network security issues and solutions such as firewall access control lists (ACLs). Learn how a jump box limits direct cloud virtual machine access. Capture traffic in a Microsoft Azure cloud computing environment, and deploy a Microsoft Azure Firewall. Look at security in virtualized environments, including infrastructure and data threats and platform-specific security responsibilities. Examine the security-based lifecycle of cloud-hosted assets and business continuity and disaster recovery concepts such as RTO and RPO and cloud functional security. Finally, learners view methodologies for mapping cloud service requirements to service provider certification and product certifications.
17 videos | 1h 21m has Assessment available Badge
CCSP 2019: Data Security Technologies
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.
12 videos | 36m has Assessment available Badge
CCSP 2019: Implementing Data Discovery & Classification
Proper data governance begins with labeling data and applying security controls based on those labels. Explore information rights management (IRM) and challenges associated with data discovery, as well as the roles played by PKI (public key infrastructure) security certificates and virtual private networks (VPNs) in the cloud. This 6-video course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin with IRM objectives such as data rights, provisioning, and access models. Examine data discovery approaches and techniques for structured and unstructured data, and challenges of data discovery in the cloud. Then examine data classification, enabled by using Microsoft Azure Information protection for sensitive data such as Protected Health Information (PHI) and Personally Identifiable Information (PII), and cardholder data. Recognize how PKI provides security for digital IT solutions; how to use PowerShell to create PKI certificates; and how to generate certificates in a Microsoft Azure Key Vault. Learn how VPNs are used for secure cloud resource access. Then configure a Microsoft Azure point-to-site VPN and a custom Microsoft Azure Key Vault key for storage account encryption.
12 videos | 42m has Assessment available Badge
CCSP 2019: Data Retention & Events
Discover how to meet regulatory compliance needs by planning and implementing data retention, deletion, and archiving policies. Explore how data events can be analyzed and used for troubleshooting problems. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. The key concepts in this course include: how to configure Azure cloud storage data retention policies; how to enable Azure storage account soft deletion; how to configure Azure storage account blob archiving; and how to configure an Azure immutable blob storage access policy. You will also learn about the standards and best practices when using eDiscovery and its purpose to find information that is stored in a digital manner for use with legal proceedings; how to filter Azure resource management activity events; and how to create Azure log queries. Finally, learn how to use the various capabilities of security information and event management (SIEM) such as data aggregation, correlation, alerting, compliance, retention, and forensic analysis.
10 videos | 29m has Assessment available Badge
CCSP 2019: Cloud Infrastructure
General categories of IT services in cloud computing include compute, storage, and networking. Explore how these services address business requirements, along with how graphical user interface (GUI) and command line tools are used to manage cloud resources. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. The key concepts in this course include: the physical aspect of a cloud platform and the related physical architecture; the networking and communication architecture of a cloud platform, including software-defined networking (SDN); how to deploy a Azure cloud virtual network; and how to understand the compute service as it applies to the cloud platform. In addition, learn how to deploy an Azure virtual machine (VM); to define storage and Storage as a Service (STaaS) within a cloud platform; and to deploy an Azure storage account. Finally, learn about cloud resources using the Azure portal; cloud resources using command line tools; and list requirements for logical design, including tenant partitioning and access control.
12 videos | 45m has Assessment available Badge
CCSP 2019: Data Center Security
Risk management ensures that realized threats have minimal impact on business operations. This 16-video course explores how security controls address security objectives, as well as the IT audit process, and how to configure high availability for cloud services. This course helps learners prepare for the Certified Cloud Security Professional exam. Key concepts covered include: risk as it applies to cloud services and underlying infrastructure, and risk analysis and management posture regarding cloud computing; integration of information security and risk management activities into a formal framework; threats and attack vectors associated with cloud services and infrastructure; and threat mitigation and attack handling techniques. Next, learn to generate an Azure storage account shared access signature, how to deploy an Azure network security group; and how to configure an Azure role-based access control (RBAC) to control virtual machine (VM) management. Finally, learn about certain auditing techniques and responsibilities and various types of audit reports. Learn how to conduct an Azure VM failover test; to deploy an Azure VM scale set; and to deploy an Azure load balancer.
16 videos | 1h has Assessment available Badge
CCSP 2019: Application Development & Security
Discover the importance of application security training and awareness and explore cloud development basics and common pitfalls and cloud vulnerabilities. This 16-video course helps in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how the software development lifecycle can incorporate security when developing cloud applications, including using GitHub; common data privacy standards, such as Secure Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and Payment Card Industry Data Security Standard (PCI DSS); and how Open Web Application Security Project (OWASP) applies to web application security. Next, learn how to configure an Azure Web Application Firewall; to deploy an Azure web app; and to configure Hypertext Transfer Protocol Secure (HTTPS) for an Azure web app custom DNS domain name. Examine different application programming interface (API) formats such as representational state transfer (REST) and simple object access protocol (SOAP); and deployment of an Azure function app. Finally, examine application testing and methodologies and learn how to apply threat modeling to reduce the impact of cloud threats.
16 videos | 1h 10m has Assessment available Badge
CCSP 2019: Identity & Access Management
Explore how to design appropriate Identity and Access Management (IAM) solutions using federated identity, identity providers, single sign-on (SSO), multifactor authentication (MFA), and cloud access security broker (CASB). This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. The key concepts covered in this course include: how to configure IAM identifying and authorizing entities to use resources, in this case in the cloud; how to deploy a new Azure Active Directory (AD) tenant; how to create an Azure AD users and groups; how to create Amazon Web Services (AWS) users and groups; how to define single sign-on/off and its place within the cloud service security framework; how to synchronize on-premises AD with Azure AD using AD Connect; how to attach policies to AWS users and groups; how MFA enhances sign-in security; how to enable MFA for Azure AD users; and how to perform a cloud user MFA sign-in.
12 videos | 34m has Assessment available Badge
CCSP 2019: Managing & Securing Cloud Infrastructure
Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.
16 videos | 56m has Assessment available Badge
CCSP 2019: Operational Controls & Standards
Compliance with regulations and controls is one of the most crucial components of operation controls and standards. Explore management components used to ensure proper documentation, auditing, and accountability procedures in this 12-video course, which helps prepare for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: compliance by using change management and the importance of continuity management. Change management is all about controlling the risk related to making changes to minimize disruptions. Continuity management is where we need to identify assets and processes. Learn the components of a good information security management plan; how to track and maintain detailed information about IT components within an organization; and view service level agreements (SLAs) for cloud services. Next, learn about digital forensic strategies that apply to cloud computing including the scope of the analysis; the hardware and software used for digital forensics; the chain of custody for evidence collection and non-repudiation; and how to view security listings in the Azure Security Center.
12 videos | 40m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.7 of 64 users Rating 4.7 of 64 users (64)
Rating 4.5 of 84 users Rating 4.5 of 84 users (84)