Aspire Journeys

Network Security Specialist to CloudOps Security Architect

  • 35 Courses | 30h 27m 57s
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
With more businesses implementing cloud technology, it's important to have proper security measures in place. This Skillsoft Aspire journey explores the steps required to go from a Network Security Specialist to CloudOps Security Architect.

Track 1: Network Security Specialist

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud services, cloud security fundamentals, business continuity management, and cloud computing security.

  • 11 Courses | 8h 27m 56s

Track 2: Security Admin

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on security administration and cloud security administration.

  • 7 Courses | 6h 44m 30s

Track 3: Cloud Security Admin

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud security management and securing Amazon Web Services.

  • 11 Courses | 8h 41m 32s

Track 4: Cloud Security Architect

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud security architect and cloud platform security.

  • 6 Courses | 6h 33m 59s

COURSES INCLUDED

Cloud Services: Cloud Computing Concepts
Explore fundamental cloud computing concepts such as cloud service models, hosting options, and security considerations, among other topics covered in this 14-video course. Begin by examining cloud benefits, components, and service models; the differences between cloud computing roles such as cloud service customer, cloud service architect, and cloud auditor, and learn the differences between on-premises and cloud implementations. This leads to an overview of the IaaS (Infrastructure as a Service) cloud service model; the SaaS (Software as a Service) cloud service model, and what needs to be considered when using the PaaS (Platform-as-a-Service) cloud service model. Next, take a look at benefits and potential pitfalls for private cloud implementation; advantages and disadvantages of using a public cloud; benefits of using a hybrid cloud solution, and benefits and potential pitfalls of using a community cloud. Learners will examine the potential risks and benefits of migrating to the cloud, and explore common cloud vulnerabilities such as negligence, cyber threats, and system vulnerabilities.
14 videos | 57m has Assessment available Badge
Cloud Security Fundamentals: Basics of Cloud Operations
Learners can build a foundation for upcoming cloud security topics by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies in this 9-video course. In the first tutorial, you will learn what cloud computing is, its definitions, and roles. You will then examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas). Learners next take a look at the building blocks of what makes cloud computing tick, which is virtualization technology. Following on from this, you will explore compute building block technologies; storage building block technologies, and networking building block technologies. You will also need to be aware of the different database building block technologies offered by your cloud provider. In the final tutorial in this course, learners will compare common public cloud solution provider (CSP) product offerings. In the concluding exercise, you will need to list four advantages of cloud computing, four common software as a service solutions, and four database building block technologies.
10 videos | 54m has Assessment available Badge
Cloud Security Fundamentals: Architectural & Design Concepts
In this 9-video course, learners explore the fundamentals of cloud architecture and design, including three-tier design, shared responsibility, development lifecycles, risk management, and migration and deployment strategies. Begin by taking a look at a common three-tier design model, consisting of a web tier, an application tier, and a database tier model. You will also examine how to expand this into a four-tier model, for more granular visibility and security in the middle layers. The next tutorial concerns the importance of understanding the shared responsibility between your organization, your data center, your assets, your server farms, your development code, and your provider. Learners will then observe how to perform cost/benefit analysis for the cloud service provider (CSP). Also, you will explore common development lifecycles, and learn about the basics of risk management. Delve into common deployment and migration strategies, and the Cloud Security Alliance (CSA) cloud data lifecycle. In the final tutorial, learners will examine the basics of storage management lifecycles. The concluding exercise directs learners to describe cloud architecture concepts,
10 videos | 32m has Assessment available Badge
Cloud Security Fundamentals: Cloud Infrastructure Security
Learners discover how to secure the Cloud Solution Provider (CSP) account from the outset by using best practices and techniques, in this 11-video course. Other infrastructure security concepts such as Integrated Access Manager (IAM), network access control lists (NACLs), firewalls, and web application firewalls (WAFs) are also covered. Begin by learning about designing and planning security controls to ensure adequate protection of resources. Then explore practical aspects of dealing with a cloud service provider and securing the root account, or billing account. The next tutorial focuses on IAM groups and users, which leads into examining IAM policies and permissions. You will learn how to define IAM roles; explore secure management access; and define network access control lists. Learn about secure management access and Secure Shell (SSH) and transport layer security (TLS). Learn how to define NACLs; configure stateful firewalls (which track connections and automatically allow returning traffic) in the cloud; and describe WAFs. In the final tutorial, discover best practices for hardening virtual machines. The concluding exercise asks learners to describe cloud infrastructure security.
12 videos | 58m has Assessment available Badge
Cloud Security Fundamentals: Cloud Data Security
In this 10-video course, you will learn about securing cloud data-at-rest and data-in-transit by using various cryptographic mechanisms and security controls offered by the cloud service provider. To begin, you will take a look at cryptographic mechanisms, and then move on to common cryptography protocols. In the next tutorial, you will compare client-side encryption (CSE) and server-side encryption (SSE), and then examine file and database security. You will explore object storage security, examples of which would be Google Cloud Storage and Amazon's S3, before taking a look at using key management services from the cloud service provider. Observe how to define public key infrastructure (PKI), which is based on asymmetric key cryptosystems. In the final tutorial in this course, you will be examining hardware security modules, or HSM. A module is a device or a modular component or a piece of hardware that protects and manages digital keys, which can be session keys, private keys, part of a PKI. The concluding exercise entails describing cloud data security.
10 videos | 47m has Assessment available Badge
Cloud Security Fundamentals: Cloud Application Security
Explore how to secure applications in the cloud, including training and awareness, assurance and validation, the secure software development lifecycle (SDLC), federated services, single sign-on (SSO), and advanced managed services from cloud providers, in this 8-video course. Begin by learning to define training and awareness in application security, and then learn about cloud software assurance and validation. The next tutorial concerns using verified secure software, focusing on two methodologies for security testing or application security testing (AST), in your organization. You will then learn about applying the secure software development lifecycle. You will take a look at comparing cloud application architectures, which includes the five key steps to building a secure cloud-ready application. You will discover federation and SSO solutions, and finally, observe how to compare advanced cloud security products. In the concluding exercise, you are asked to list methods of creating security awareness, methods for enhancing application security in the cloud, and the steps of successful software validation.
9 videos | 43m has Assessment available Badge
Cloud Security Fundamentals: Legal & Compliance
In this 8-video course, you will explore the critical and often over-looked approaches to legal and regulatory compliance when working with cloud solution providers. The best way to manage compliance by using different regulations and different security controls is to have some type of methodology or architecture, and this can involve a wide variety of different practices, so you will take a look at some of these practices. Next, you will delve into legal requirements and risks as it is important to be aware of certain legal requirements and regulations and other risks that go along with various aspects of dealing with cloud computing. You will continue by examining privacy issues and jurisdictional variation. Next, you will learn about audit processes and methodologies for the cloud, followed by outsourcing and cloud contract design. The final tutorial in this course focuses on common regulations and mandates. The concluding exercise directs learners to describe legal and compliance issues in the cloud.
8 videos | 29m has Assessment available Badge
Business Continuity: Cloud Integration
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.
14 videos | 1h 3m has Assessment available Badge
Business Continuity: Secure Cloud Computing
In this 14-video course, learners will discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention. Begin by examining the requirements for business continuity strategy; recognize requirements for disaster recovery strategy, and recognize considerations when moving applications to the cloud. Learn how to differentiate between data ownership and data custody, and explore key legal considerations when moving to the cloud. Next, learn about the importance of performing a cost-benefit analysis, and then recognize the factors that can impact confidentiality, integrity, data integrity, and availability of cloud data. This leads into cloud offering services, and a look at benefits of cloud offerings such as Amazon Web Services (AWS) and Azure. Recognize functional security requirements such as portability, interoperability, and vendor lock-in. Design and plan security controls including on-premises physical controls, virtualization protection, and authorization. The final two tutorials examine the importance of retention policies and archiving procedures, and the considerations relating to traceability and accountability such as logging, event sources, and chain of custody.
14 videos | 48m has Assessment available Badge
Cloud Management
Learners can explore cloud deployment considerations, cloud management, and some of the challenges and considerations resulting from different types of cloud platforms, in this 14-video course. To begin, take a look at the challenges of cloud service such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). This leads into learning about challenges introduced by different types of cloud platforms such as public, private, hybrid, and community. Learners next explore considerations related to cloud management and study specifics about cloud application architecture, and Identity and Access Management (IAM) solutions. Discover how to differentiate between physical versus logical infrastructure for cloud operations, and how to implement operational controls and standards. Observe how to ensure compliance with regulations and controls, such as Information Technology Infrastructure Library (ITIL) and ISO/IEC 20000-1; learn to recognize different privacy concerns; and take a look at auditing, its processes and methodologies. Examine the importance of Service Level Agreements (SLAs), and finally, learn about vendor management considerations such as supply chain risk.
14 videos | 1h 12m has Assessment available Badge
Final Exam: Network Security Specialist
Final Exam: Network Security Specialist will test your knowledge and application of the topics presented throughout the Network Security Specialist track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
1 video | 32s has Assessment available Badge

COURSES INCLUDED

Cloud Security Administration: Introduction
While importing data or running workloads in the cloud, it is important to ensure security and consider various associated risks. There are regulatory certifications that help ensure that all assets in the cloud are safe and that all procedures have been implemented to protect the client's intellectual rights and data. In this course, you'll examine different government regulations, compliance, and e-frameworks. In addition, you'll learn about audit and cloud certification that can help customers understand the type of workload running in the cloud.
11 videos | 1h 5m has Assessment available Badge
Cloud Security Administration: Infrastructure Planning
Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you'll learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.
13 videos | 55m has Assessment available Badge
Cloud Security Administration: Cloud Data & Application Security
Various applications are persisting in the cloud, proper practices have to be followed to secure their code and data. The cloud being a modular product, it has large amount of code associated and integrated into it. For this reason, proper life cycle management is required. This includes patching, encryption, and minimizing business impact, and ensuring the tools and applications are available. In this course, you'll learn about the cloud software life cycle, securing the applications, and securing access to different assets in cloud.
13 videos | 1h has Assessment available Badge
Cloud Security Administration: Hardened Cloud Security
An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software. In this course, you'll learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.
10 videos | 45m has Assessment available Badge
Cloud Security Administration: Continuous Operational Improvement
"To manage, operate, and maintain the cloud environment, proper procedures have to be in place. In this course, you'll learn about design concepts and the various models that can be used for operational improvements. You'll then move to on learn about how to create a management plan, ITSM operation management, risk management, and stakeholder communication. "
11 videos | 1h 26m has Assessment available Badge
Cloud Security Administration: Regulatory Conformance
While importing data or running workloads on the cloud, it's important to ensure security and be aware of risks. In this course, you'll learn about various cloud regulatory certifications that help ensure that all cloud assets are safe and all procedures have been implemented to protect client data and intellectual rights. You'll also explore the e-Discover process, cloud auditing, service level agreements, and supply chain management.
11 videos | 1h 29m has Assessment available Badge
Final Exam: Security Admin
Final Exam: Security Admin will test your knowledge and application of the topics presented throughout the Security Admin track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
1 video | 32s has Assessment available Badge

COURSES INCLUDED

Cloud Security Management: Architecture Security
Cloud objects are very dynamic, so it is important to be familiar with current cloud core design, as well as cloud security and integrity. In this course, you'll learn about cloud security management. You'll examine key terms and cloud roles that can be adopted to meet client requirements. In addition, you'll explore cloud transition scenarios, how to secure the cloud perimeter, the importance of access control, common cloud threats, and cloud model security considerations. Lastly, you'll learn about the secure data life cycle, business continuity, and disaster recovery planning.
12 videos | 1h 12m has Assessment available Badge
Cloud Security Management: Operations Security
Operations is one of the most crucial steps in the administration process. Handled properly, they ensure loop holes get closed and provide evidence details that can be used in issue tracking. In this course, you'll learn about different types of operations, how to execute them, and why they are important in the dynamic nature of the cloud. You'll also learn about communicating with stakeholders, digital evidence, and business continuity planning.
12 videos | 1h 24m has Assessment available Badge
Cloud Security Management: Data Security
Data is the key to information on different components within an organization, so it's vital to understand and manage data and security events. With the dynamic nature of the cloud, it's also essential to understand how to track and secure data. In this course, you'll learn about the different types of data and how to securely manage it. In addition, you'll examine different types of compliance, privacy rights, and protection policies.
10 videos | 48m has Assessment available Badge
Cloud Security Management: Risk Management
Every organization needs to understand risk and be familiar with how to mitigate it. Cloud services have different stakeholders and projects, and for this reason having a good understanding of risk is important. In this course, you'll learn about different types of risk and how to properly manage them. In addition, you'll explore risk auditing, business continuity, and disaster recovery.
9 videos | 1h 4m has Assessment available Badge
Cloud Security Management: Platform & Infrastructure Security
The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.
8 videos | 49m has Assessment available Badge
Cloud Security Management: Legal & Compliance
It is important to understand the different cloud compliance procedures that should be followed by service providers and data owners. It's also vital to be familiar with the various cloud-specific legal compliance guidelines. In this course, you'll learn about international legislation conflicts, cloud-specific risks, legal controls, e-Discovery processes, and requirements for forensic analysis.
9 videos | 47m has Assessment available Badge
Securing AWS: Fundamentals
In this 8-video course, you will examine foundational topics for securing Amazon Web Services (AWS), such as the Shared Responsibility Model, security basics like the CIA Triad (confidentiality, integrity, and availability), the Parkerian Hexad, and security control categories and types, core AWS services and related threats, and compliance. Begin with a look at the AWS Shared Responsibility Model, which is between Amazon and client. The next tutorial is about understanding the CIA Triad and the Parkerian hexad, the main security services that you will provide for your data. This leads to a closer look at the types and categories of control, and then reviewing the core AWS services to ensure a proper understanding of various services and offerings. You will then survey some of the common threats to AWS products and service offerings, starting with access control breaches. The final tutorial focuses on AWS compliance services. In the closing exercise, learners describe the Shared Responsibility Model, security services and controls, core AWS services and threats, and AWS compliance.
8 videos | 29m has Assessment available Badge
Securing AWS: Identity & Access Management
Learners will discover how to apply best practices to the new Amazon Web Services (AWS) root account and examine credentials, passwords, and access key usage in this 8-video course. Identity and Access Management (IAM) topics such as users, groups, roles, and managed policies are also covered. The first tutorial examines root account security, which leads to comparing credentials, passwords, and access keys and their use. Next, you will learn about using the AWS command-line interface (CLI), a unified tool that allows you to manage your various AWS Services through a CLI. An important best practice to learn is using a bastion host, also known as a bastion server or a jump host, whose purpose is to give access to private networks from external networks, such as the Internet. Continue with an introduction to the AWS IAM service and its configuration. The final tutorial looks at managed policies available through the IAM service. In the exercise, you will be asked to describe root account security, credentials, AWS CLI, bastions, and AWS IAM.
8 videos | 39m has Assessment available Badge
Securing AWS: Infrastructure Security
In this 11-video course, explore a variety of Amazon Web Services (AWS) features that can help the consumer to protect cloud infrastructures and resources, including network access control lists (NACLs), security groups, and Web Application Firewalls. One of the most important aspects of AWS security begins when you design your virtual private cloud, so the first tutorial teaches you about its design. Next, you will examine how to configure the NACL, along with configuring security groups for Linux instances, and security groups for Windows instances. Following on from this, you will take a look at the Web Application Firewall (WAF). You will then explore a couple of other security services at AWS, beginning with AWS Shield Advanced, and then AWS Inspector. Then move on to AWS GuardDuty, a fully-managed threat detection service that basically continuously monitors for malicious or unauthorized behavior. Then learn how to configure a managed site-to-site VPN, and define AWS Single Sign-On (SSO) and AWS Cognito. The exercise covers infrastructure security.
11 videos | 54m has Assessment available Badge
Securing AWS: Data Protection
There are a number of mechanisms in Amazon Web Services (AWS) for securing data-at-rest and data-in-transit. In this 8-video course, learners explore topics including the basics of cryptography, access keys and pairs, client-side versus server-side encryption, AWS Key Management Service (KMS), Certificate Manager, and CloudHSM (hardware security module). The course begins with an introduction to fundamentals of cryptography and some of the cryptographic mechanisms you need to be aware of for AWS. You will then take a look at how to use access keys and key pairs, followed by another tutorial comparing client-side encryption and server-side encryption. The next topic is AWS Key Management Service, which lets you manage cryptographic keys for your cloud services, followed by a look at AWS Certificate Manager. The final tutorial in this course explores CloudHSM. In the concluding exercise, learners are asked to list the attributes of cryptographic hashing, the options for encrypting an S3 bucket object, and the security services provided by digital signatures.
8 videos | 31m has Assessment available Badge
Final Exam: Cloud Security Admin
Final Exam: Cloud Security Admin will test your knowledge and application of the topics presented throughout the Cloud Security Admin track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
1 video | 32s has Assessment available Badge

COURSES INCLUDED

Cloud Platform Security: Designing Secure Access
In this course, you'll examine the principles of identity and privileged access management, which will help you and your organization to secure the content in the cloud. We will take a deep dive on IAM concepts of three platforms, configuring the directory services and identifying regions. You'll also learn about securing the cloud resources using subnets, virtual private clouds, security groups and virtual networks.
16 videos | 1h 30m has Assessment available Badge
Cloud Platform Security: Infrastructure Protection
In this course, you'll learn how to protect organizational cloud infrastructure by optimizing security using tools like Azure Advisor. This will help you to understand seccurng cloud contents, configuring the security for these contents, methods of implementing access control lists (ACLs) to secure the storage and network in the cloud. You'll explore how to apply security measures on different levels of security using available features, tools and also you will learn about hardware security modules and key vaults.
18 videos | 1h 32m has Assessment available Badge
Cloud Platform Security: System Monitoring & Protection
Cloud system monitoring is used to proactively identify and evaluate security vulnerabilities and allow organizations to explore options to protect their assets using available cloud platform tools. In this course, you'll learn how to proactively shield cloud infrastructure by monitoring organizational security using built-in Azure and Google Cloud Platform (GCP) security tools and services. You'll examine how to use monitoring tools like security information in Azure, Google Cloud Armor, Google Cloud Scanner, and the VM placement algorithm to prevent threats.
13 videos | 1h 29m has Assessment available Badge
Cloud Platform Security: Incident Response & Remediation
In this course, you'll learn how to remeditate cloud infrastructure security vulnerabilities by detecting and responding to them. Both Azure and the Google Cloud Platform (GCP) provide tools to mitigate and recover from data loss. Tools that can be leveraged for security incidence response and mitigation include the Azure Security Centre (ASC), Cloud Security Scanner, and Google Cloud Security Command Centre (SCC).
12 videos | 1h 9m has Assessment available Badge
Cloud Platform Security: Platform & Infrastructure Security
The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.
8 videos | 52m has Assessment available Badge
Final Exam: Cloud Security Architect
Final Exam: Cloud Security Architect will test your knowledge and application of the topics presented throughout the Cloud Security Architect track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
1 video | 32s has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 72 users Rating 4.4 of 72 users (72)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)