Cloud Security Course

Take a deep dive into cloud security, the rules and regulations governing security and various tools and services needed to protect the cloud.

1 hour, 22 minutes

Course description

This course explores how to keep the cloud secure. Explore policies, standards and compliance before looking at authentication and authorization considerations. Then delve into encryption, account management, security tools, services, models and automation possibilities.


Models and Security

Video - 00:06:00

Handling blockchain data is different than with traditional databases. There are certain considerations you need to keep in mind. This episode discusses the two types of data, local and state variables, and the types of memory, stack, memory, and storage.
Security Automation and Orchestration

Video - 00:06:00

A significant benefit of cloud computing is the available automation and orchestration solutions. This episode describes such solutions and the fundamental difference between automation and orchestration.
Security Services

Video - 00:05:00

Traditional security tools that we have used on local networks and systems also apply to the cloud. This episode explains how these services should be used in the cloud.
Security Tools Demo

Video - 00:07:00

It is important to understand the security tools available in your chosen cloud service provider. It is also important to understand the scope of impact from any tools used. This episode introduces the various security tools available.
Segmentation Lab

Video - 00:05:00

Segmentation is implemented in various ways in cloud computing. This episode explains three different segmentations methods often used in the cloud.
Account Management Lab

Video - 00:07:00

Cloud solution accounts are used to provide access to cloud resources. These accounts should be secured and this episode explains how.
Compute Security Demo

Video - 00:07:00

Just as you must secure physical servers on your network, you must secure servers in the cloud. This episode is focused on hardening cloud compute instances and best practices for doing so.

Video - 00:08:00

When storing data in the cloud, a lot of trust is placed on the cloud network administrators. To provide protection against internal threats, encryption can be used. This episode explains encryption at rest and at transit and some common ciphers available.
Authorization Lab

Video - 00:09:00

Authorization was explained in a preceding episode; however, this episode goes deeper into authorization to help you determine the objects that will require authorization and the methods used for access control.
Multi-Factor Authenication

Video - 00:05:00

Authorization is used to validate the rights of an acting entity on an object of that action. For example, it is used to validate that a user is allows to read or write to a given file.
Identity, Authentication, and Authorization

Video - 00:08:00

It is important to know who is accessing your cloud resources. This begins with identity management and authentication. This episode introduces identity, authentication and authorization.
Standards and Compliance Demo

Video - 00:05:00

This episode explains standards and compliance. Several regulatory and industry regulations and guidelines may impose requirements on different network types and this episode explains how to plan for them.
Security Policies

Video - 00:06:00

Effective security for cloud computing begins with well-planned and documented security policies. This episode introduces security policies and the role they play in cloud computing.

Meet the author

Mike Meyers

Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust