Internet And Network Technologies
Cloud Platform Security
Cloud Platform Security: Designing Secure Access
Cloud Platform Security: Incident Response & Remediation
Cloud Platform Security: Infrastructure Protection
Cloud Platform Security: Platform & Infrastructure Security
Cloud Platform Security: System Monitoring & Protection

Cloud Platform Security: Designing Secure Access

Course Number:
it_socdpsdj_01_enus
Lesson Objectives

Cloud Platform Security: Designing Secure Access

  • discover the key concepts covered in this course
  • define IAM methodologies for the cloud
  • list the groups and permissions in GCP/Azure
  • describe access and segregation of access using roles
  • describe how IAM works on Azure
  • use Azure Active Directory to perform configurations
  • describe the process of configuring IAM in Azure
  • identify the zones and regions specific to AWS and GCP
  • describe functions of VPC
  • recognize the services used by VPCs including PrivateLink, secure endpoints, and Direct Connect
  • configure VPC on AWS
  • identify the service controls in GCP
  • configure secure VPC in GCP
  • describe security groups and subnet concepts in Azure
  • apply and configure NSGs in VNets
  • summarize the key concepts covered in this course

Overview/Description

In this course, you'll examine the principles of identity and privileged access management, which will help you and your organization to secure the content in the cloud. We will take a deep dive on IAM concepts of three platforms, configuring the directory services and identifying regions. You'll also learn about securing the cloud resources using subnets, virtual private clouds, security groups and virtual networks.



Target

Prerequisites: none

Cloud Platform Security: Incident Response & Remediation

Course Number:
it_socdpsdj_04_enus
Lesson Objectives

Cloud Platform Security: Incident Response & Remediation

  • discover the key concepts covered in this course
  • recognize methods of proactively preventing vulnerabilities in Azure
  • list methods of detecting vulnerabilities in Azure
  • describe the ways to react to vulnerabilities in Azure
  • identify methods of proactively preventing vulnerabilities in GCP
  • use the Activity page to track activities in GCP
  • describe the IAM logging feature
  • review security incidents in Security Center in Azure
  • view audit logs in GCP
  • configure failover in Azure
  • describe how to recover data using Google Cloud Platform disaster recovery features
  • summarize the key concepts covered in this course

Overview/Description

In this course, you'll learn how to remeditate cloud infrastructure security vulnerabilities by detecting and responding to them. Both Azure and the Google Cloud Platform (GCP) provide tools to mitigate and recover from data loss. Tools that can be leveraged for security incidence response and mitigation include the Azure Security Centre (ASC), Cloud Security Scanner, and Google Cloud Security Command Centre (SCC).



Target

Prerequisites: none

Cloud Platform Security: Infrastructure Protection

Course Number:
it_socdpsdj_02_enus
Lesson Objectives

Cloud Platform Security: Infrastructure Protection

  • discover the key concepts covered in this course
  • identify how to secure your cloud deployments
  • describe functions of Azure Advisor
  • specify the security levels of cloud infrastructure
  • identify ways how to secure content using cloud infrastructure
  • describe the process that Google uses to setup their security using cloud infrastructure
  • list methods for implementing ACLs in GCP and AWS
  • use ACLs to provide custom access
  • identify how to secure cloud storage using ACL in GCP
  • describe the applications of ACL in Azure
  • list the ways to control the access on cloud infrastructure network
  • use hardware encryption to secure hardware data
  • configure the Hardware Security Module in Azure
  • apply the cloud Hardware Security Module in GCP
  • distinguish between KMS and cryptographic keys
  • describe Azure Key Vault
  • identify the features of Cloud KMS and describe how the cloud-hosted key management service lets you manage cryptographic keys for your cloud services
  • summarize the key concepts covered in this course

Overview/Description

In this course, you'll learn how to protect organizational cloud infrastructure by optimizing security using tools like Azure Advisor. This will help you to understand seccurng cloud contents, configuring the security for these contents, methods of implementing access control lists (ACLs) to secure the storage and network in the cloud. You'll explore how to apply security measures on different levels of security using available features, tools and also you will learn about hardware security modules and key vaults.



Target

Prerequisites: none

Cloud Platform Security: Platform & Infrastructure Security

Course Number:
it_socdpsdj_05_enus
Lesson Objectives

Cloud Platform Security: Platform & Infrastructure Security

  • discover the key concepts covered in this course
  • describe network functionality and technologies including SDN
  • list the key regulations used to protect datacenter facilities
  • define identification, authentication, and authorization for resources
  • recognize different concepts related to object storage and management plans
  • describe countermeasure strategies including uptime automation of controls and access controls
  • define configuration and data life cycle automation
  • summarize the key concepts covered in this course

Overview/Description

The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.



Target

Prerequisites: none

Cloud Platform Security: System Monitoring & Protection

Course Number:
it_socdpsdj_03_enus
Lesson Objectives

Cloud Platform Security: System Monitoring & Protection

  • discover the key concepts covered in this course
  • describe how monitoring works in a cloud infrastructure
  • identify how to protect data, apps, and infrastructure quickly with built-in security services in Azure
  • recognize ways to perform monitoring in GCP
  • recognize cloud infrastructure security flaws
  • identify the common risks in security infrastructure
  • list common techniques for tackling threats
  • list Azure cloud tools
  • describe how to protect your services against denial of service and web attacks
  • use Google Cloud Security Scanner you automatically scan App Engine, Compute Engine, and Google Kubernetes Engine apps for common vulnerabilities
  • describe how the VM placement algorithm works
  • describe how to implement threat prevention mechanisms using VM placement algorithm
  • summarize the key concepts covered in this course

Overview/Description

Cloud system monitoring is used to proactively identify and evaluate security vulnerabilities and allow organizations to explore options to protect their assets using available cloud platform tools. In this course, you'll learn how to proactively shield cloud infrastructure by monitoring organizational security using built-in Azure and Google Cloud Platform (GCP) security tools and services. You'll examine how to use monitoring tools like security information in Azure, Google Cloud Armor, Google Cloud Scanner, and the VM placement algorithm to prevent threats.



Target

Prerequisites: none

Close Chat Live