Course

Cloud Security

Take a deep dive into cloud security, the rules and regulations governing security and various tools and services needed to protect the cloud.

    Syllabus

  • Security Policies Video — 00:05:42
    • Effective security for cloud computing begins with well-planned and documented security policies. This episode introduces security policies and the role they play in cloud computing.

  • Security Automation and Orchestration Video — 00:05:42
    • A significant benefit of cloud computing is the available automation and orchestration solutions. This episode describes such solutions and the fundamental difference between automation and orchestration.

  • Security Tools Demo Video — 00:07:10
    • It is important to understand the security tools available in your chosen cloud service provider. It is also important to understand the scope of impact from any tools used. This episode introduces the various security tools available.

  • Account Management Lab Video — 00:07:07
    • Cloud solution accounts are used to provide access to cloud resources. These accounts should be secured and this episode explains how.

  • Encryption Video — 00:07:58
    • When storing data in the cloud, a lot of trust is placed on the cloud network administrators. To provide protection against internal threats, encryption can be used. This episode explains encryption at rest and at transit and some common ciphers available.

  • Multi-Factor Authenication Video — 00:04:41
    • Authorization is used to validate the rights of an acting entity on an object of that action. For example, it is used to validate that a user is allows to read or write to a given file.

  • Standards and Compliance Demo Video — 00:05:16
    • This episode explains standards and compliance. Several regulatory and industry regulations and guidelines may impose requirements on different network types and this episode explains how to plan for them.

  • Models and Security Video — 00:06:00
    • Handling blockchain data is different than with traditional databases. There are certain considerations you need to keep in mind. This episode discusses the two types of data, local and state variables, and the types of memory, stack, memory, and storage.

  • Security Services Video — 00:04:54
    • Traditional security tools that we have used on local networks and systems also apply to the cloud. This episode explains how these services should be used in the cloud.

  • Segmentation Lab Video — 00:04:53
    • Segmentation is implemented in various ways in cloud computing. This episode explains three different segmentations methods often used in the cloud.

  • Compute Security Demo Video — 00:06:39
    • Just as you must secure physical servers on your network, you must secure servers in the cloud. This episode is focused on hardening cloud compute instances and best practices for doing so.

  • Authorization Lab Video — 00:08:31
    • Authorization was explained in a preceding episode; however, this episode goes deeper into authorization to help you determine the objects that will require authorization and the methods used for access control.

  • Identity, Authentication, and Authorization Video — 00:07:50
    • It is important to know who is accessing your cloud resources. This begins with identity management and authentication. This episode introduces identity, authentication and authorization.

Syllabus

Course description

This course explores how to keep the cloud secure. Explore policies, standards and compliance before looking at authentication and authorization considerations. Then delve into encryption, account management, security tools, services, models and automation possibilities.

Meet the author

Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library