Cloud Security Course
1 hour, 22 minutes
Course description
This course explores how to keep the cloud secure. Explore policies, standards and compliance before looking at authentication and authorization considerations. Then delve into encryption, account management, security tools, services, models and automation possibilities.Syllabus
Models and Security
Video - 00:06:00
Handling blockchain data is different than with traditional databases. There are certain considerations you need to keep in mind. This episode discusses the two types of data, local and state variables, and the types of memory, stack, memory, and storage.
Security Automation and Orchestration
Video - 00:06:00
A significant benefit of cloud computing is the available automation and orchestration solutions. This episode describes such solutions and the fundamental difference between automation and orchestration.
Security Services
Video - 00:05:00
Traditional security tools that we have used on local networks and systems also apply to the cloud. This episode explains how these services should be used in the cloud.
Security Tools Demo
Video - 00:07:00
It is important to understand the security tools available in your chosen cloud service provider. It is also important to understand the scope of impact from any tools used. This episode introduces the various security tools available.
Segmentation Lab
Video - 00:05:00
Segmentation is implemented in various ways in cloud computing. This episode explains three different segmentations methods often used in the cloud.
Account Management Lab
Video - 00:07:00
Cloud solution accounts are used to provide access to cloud resources. These accounts should be secured and this episode explains how.
Compute Security Demo
Video - 00:07:00
Just as you must secure physical servers on your network, you must secure servers in the cloud. This episode is focused on hardening cloud compute instances and best practices for doing so.
Encryption
Video - 00:08:00
When storing data in the cloud, a lot of trust is placed on the cloud network administrators. To provide protection against internal threats, encryption can be used. This episode explains encryption at rest and at transit and some common ciphers available.
Authorization Lab
Video - 00:09:00
Authorization was explained in a preceding episode; however, this episode goes deeper into authorization to help you determine the objects that will require authorization and the methods used for access control.
Multi-Factor Authenication
Video - 00:05:00
Authorization is used to validate the rights of an acting entity on an object of that action. For example, it is used to validate that a user is allows to read or write to a given file.
Identity, Authentication, and Authorization
Video - 00:08:00
It is important to know who is accessing your cloud resources. This begins with identity management and authentication. This episode introduces identity, authentication and authorization.
Standards and Compliance Demo
Video - 00:05:00
This episode explains standards and compliance. Several regulatory and industry regulations and guidelines may impose requirements on different network types and this episode explains how to plan for them.
Security Policies
Video - 00:06:00
Effective security for cloud computing begins with well-planned and documented security policies. This episode introduces security policies and the role they play in cloud computing.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps