Aspire Journeys

Network Security Specialist to CloudOps Security Architect

  • 35 Courses | 34h 51m 20s
Likes 105 Likes 105
With more businesses implementing cloud technology, it's important to have proper security measures in place. This Skillsoft Aspire journey explores the steps required to go from a Network Security Specialist to CloudOps Security Architect.

Track 1: Network Security Specialist

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud services, cloud security fundamentals, business continuity management, and cloud computing security.

  • 11 Courses | 9h 46m 28s

Track 2: Security Admin

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on security administration and cloud security administration.

  • 7 Courses | 7h 43m 9s

Track 3: Cloud Security Admin

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud security management and securing Amazon Web Services.

  • 11 Courses | 9h 49m 11s

Track 4: Cloud Security Architect

In this Skillsoft Aspire journey track of the Network Security Specialist to CloudOps Security Architect Journey, the focus will be on cloud security architect and cloud platform security.

  • 6 Courses | 7h 32m 32s

COURSES INCLUDED

Cloud Services: Cloud Computing Concepts
Explore fundamental cloud computing concepts such as cloud service models, hosting options, and security considerations, among other topics covered in this 14-video course. Begin by examining cloud benefits, components, and service models; the differences between cloud computing roles such as cloud service customer, cloud service architect, and cloud auditor, and learn the differences between on-premises and cloud implementations. This leads to an overview of the IaaS (Infrastructure as a Service) cloud service model; the SaaS (Software as a Service) cloud service model, and what needs to be considered when using the PaaS (Platform-as-a-Service) cloud service model. Next, take a look at benefits and potential pitfalls for private cloud implementation; advantages and disadvantages of using a public cloud; benefits of using a hybrid cloud solution, and benefits and potential pitfalls of using a community cloud. Learners will examine the potential risks and benefits of migrating to the cloud, and explore common cloud vulnerabilities such as negligence, cyber threats, and system vulnerabilities.
14 videos | 1h
has Assessment available Badge
Cloud Security Fundamentals: Basics of Cloud Operations
Learners can build a foundation for upcoming cloud security topics by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies in this 9-video course. In the first tutorial, you will learn what cloud computing is, its definitions, and roles. You will then examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas). Learners next take a look at the building blocks of what makes cloud computing tick, which is virtualization technology. Following on from this, you will explore compute building block technologies; storage building block technologies, and networking building block technologies. You will also need to be aware of the different database building block technologies offered by your cloud provider. In the final tutorial in this course, learners will compare common public cloud solution provider (CSP) product offerings. In the concluding exercise, you will need to list four advantages of cloud computing, four common software as a service solutions, and four database building block technologies.
10 videos | 57m
has Assessment available Badge
Cloud Security Fundamentals: Architectural & Design Concepts
In this 9-video course, learners explore the fundamentals of cloud architecture and design, including three-tier design, shared responsibility, development lifecycles, risk management, and migration and deployment strategies. Begin by taking a look at a common three-tier design model, consisting of a web tier, an application tier, and a database tier model. You will also examine how to expand this into a four-tier model, for more granular visibility and security in the middle layers. The next tutorial concerns the importance of understanding the shared responsibility between your organization, your data center, your assets, your server farms, your development code, and your provider. Learners will then observe how to perform cost/benefit analysis for the cloud service provider (CSP). Also, you will explore common development lifecycles, and learn about the basics of risk management. Delve into common deployment and migration strategies, and the Cloud Security Alliance (CSA) cloud data lifecycle. In the final tutorial, learners will examine the basics of storage management lifecycles. The concluding exercise directs learners to describe cloud architecture concepts.
10 videos | 36m
has Assessment available Badge
Cloud Security Fundamentals: Cloud Infrastructure Security
Learners discover how to secure the Cloud Solution Provider (CSP) account from the outset by using best practices and techniques, in this 11-video course. Other infrastructure security concepts such as Integrated Access Manager (IAM), network access control lists (NACLs), firewalls, and web application firewalls (WAFs) are also covered. Begin by learning about designing and planning security controls to ensure adequate protection of resources. Then explore practical aspects of dealing with a cloud service provider and securing the root account, or billing account. The next tutorial focuses on IAM groups and users, which leads into examining IAM policies and permissions. You will learn how to define IAM roles; explore secure management access; and define network access control lists. Learn about secure management access and Secure Shell (SSH) and transport layer security (TLS). Learn how to define NACLs; configure stateful firewalls (which track connections and automatically allow returning traffic) in the cloud; and describe WAFs. In the final tutorial, discover best practices for hardening virtual machines. The concluding exercise asks learners to describe cloud infrastructure security.
12 videos | 1h
has Assessment available Badge
Cloud Security Fundamentals: Cloud Data Security
In this 10-video course, you will learn about securing cloud data-at-rest and data-in-transit by using various cryptographic mechanisms and security controls offered by the cloud service provider. To begin, you will take a look at cryptographic mechanisms, and then move on to common cryptography protocols. In the next tutorial, you will compare client-side encryption (CSE) and server-side encryption (SSE), and then examine file and database security. You will explore object storage security, examples of which would be Google Cloud Storage and Amazon's S3, before taking a look at using key management services from the cloud service provider. Observe how to define public key infrastructure (PKI), which is based on asymmetric key cryptosystems. In the final tutorial in this course, you will be examining hardware security modules, or HSM. A module is a device or a modular component or a piece of hardware that protects and manages digital keys, which can be session keys, private keys, part of a PKI. The concluding exercise entails describing cloud data security.
10 videos | 51m
has Assessment available Badge
Cloud Security Fundamentals: Cloud Application Security
Explore how to secure applications in the cloud, including training and awareness, assurance and validation, the secure software development lifecycle (SDLC), federated services, single sign-on (SSO), and advanced managed services from cloud providers, in this 8-video course. Begin by learning to define training and awareness in application security, and then learn about cloud software assurance and validation. The next tutorial concerns using verified secure software, focusing on two methodologies for security testing or application security testing (AST), in your organization. You will then learn about applying the secure software development lifecycle. You will take a look at comparing cloud application architectures, which includes the five key steps to building a secure cloud-ready application. You will discover federation and SSO solutions, and finally, observe how to compare advanced cloud security products. In the concluding exercise, you are asked to list methods of creating security awareness, methods for enhancing application security in the cloud, and the steps of successful software validation.
9 videos | 47m
has Assessment available Badge
Cloud Security Fundamentals: Legal & Compliance
In this 8-video course, you will explore the critical and often over-looked approaches to legal and regulatory compliance when working with cloud solution providers. The best way to manage compliance by using different regulations and different security controls is to have some type of methodology or architecture, and this can involve a wide variety of different practices, so you will take a look at some of these practices. Next, you will delve into legal requirements and risks as it is important to be aware of certain legal requirements and regulations and other risks that go along with various aspects of dealing with cloud computing. You will continue by examining privacy issues and jurisdictional variation. Next, you will learn about audit processes and methodologies for the cloud, followed by outsourcing and cloud contract design. The final tutorial in this course focuses on common regulations and mandates. The concluding exercise directs learners to describe legal and compliance issues in the cloud.
8 videos | 32m
has Assessment available Badge
Business Continuity: Cloud Integration
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.
14 videos | 1h
has Assessment available Badge
Business Continuity: Secure Cloud Computing
In this 14-video course, learners will discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention. Begin by examining the requirements for business continuity strategy; recognize requirements for disaster recovery strategy, and recognize considerations when moving applications to the cloud. Learn how to differentiate between data ownership and data custody, and explore key legal considerations when moving to the cloud. Next, learn about the importance of performing a cost-benefit analysis, and then recognize the factors that can impact confidentiality, integrity, data integrity, and availability of cloud data. This leads into cloud offering services, and a look at benefits of cloud offerings such as Amazon Web Services (AWS) and Azure. Recognize functional security requirements such as portability, interoperability, and vendor lock-in. Design and plan security controls including on-premises physical controls, virtualization protection, and authorization. The final two tutorials examine the importance of retention policies and archiving procedures, and the considerations relating to traceability and accountability such as logging, event sources, and chain of custody.