Internet And Network Technologies
Cloud Security Administration
Cloud Security Administration: Cloud Data & Application Security
Cloud Security Administration: Continuous Operational Improvement
Cloud Security Administration: Hardened Cloud Security
Cloud Security Administration: Infrastructure Planning
Cloud Security Administration: Introduction
Cloud Security Administration: Regulatory Conformance

Cloud Security Administration: Cloud Data & Application Security

Course Number:
it_socsaddj_03_enus
Lesson Objectives

Cloud Security Administration: Cloud Data & Application Security

  • discover the key concepts covered in this course
  • work with shared services and data protection
  • perform fine-grained queries to get selective access control
  • use secure deployment practices to develop and secure cloud applications
  • describe identity access control including details on authentication and authorization
  • identify actions of IAM in AWS and Azure
  • describe the software development life cycle and issues
  • recognize the importance of encryption and key management
  • describe how to secure SAAS cloud by focusing on SAAS applications
  • create a business continuity plan and work on its implementation
  • identify various techniques including crypto, tokenization, data masking, and dip
  • describe DRM, different data protection policies, event handing, and SIEM
  • summarize the key concepts covered in this course

Overview/Description

Various applications are persisting in the cloud, proper practices have to be followed to secure their code and data. The cloud being a modular product, it has large amount of code associated and integrated into it. For this reason, proper life cycle management is required. This includes patching, encryption, and minimizing business impact, and ensuring the tools and applications are available.

In this course, you値l learn about the cloud software life cycle, securing the applications, and securing access to different assets in cloud.



Target

Prerequisites: none

Cloud Security Administration: Continuous Operational Improvement

Course Number:
it_socsaddj_05_enus
Lesson Objectives

Cloud Security Administration: Continuous Operational Improvement

  • discover the key concepts covered in this course
  • identify various design concepts including logical and physical design
  • recognize best practices for servers, storage networks, and virtual switches
  • describe how to secure network operations including network isolation, VLANs, TLS, DNS, and IPsec
  • list the key features of dynamic clusters, storage maintenance, and HA on cloud
  • define patch management, performance monitoring, and backup
  • describe the need for patch management and the process involved
  • describe information security and how to manage operations
  • describe the risk management process in logical and physical infrastructures
  • list best practices for communicating with vendors, partners, and customers
  • summarize the key concepts covered in this course

Overview/Description

"To manage, operate, and maintain the cloud environment, proper procedures have to be in place. In this course, you値l learn about design concepts and the various models that can be used for operational improvements. You'll then move to on learn about how to create a management plan, ITSM operation management, risk management, and stakeholder communication.
"



Target

Prerequisites: none

Cloud Security Administration: Hardened Cloud Security

Course Number:
it_socsaddj_04_enus
Lesson Objectives

Cloud Security Administration: Hardened Cloud Security

  • discover the key concepts covered in this course
  • describe how to harden physical hosts and help reduce the attack surface by using a virtual guest
  • identify the importance of control over physical security and assets
  • define data outsourcing and how to prevent loss of control on data
  • specify how to provide cloud security while keeping track of limitations including vulnerability of infrastructure, platform, and service
  • define deceptive information and how to protect data
  • recognize the importance of encrypted queries and protecting personal data
  • differentiate between privacy and information systems
  • describe the life cycle of securing data in cloud
  • summarize the key concepts covered in this course

Overview/Description

An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software.

In this course, you値l learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.



Target

Prerequisites: none

Cloud Security Administration: Infrastructure Planning

Course Number:
it_socsaddj_02_enus
Lesson Objectives

Cloud Security Administration: Infrastructure Planning

  • discover the key concepts covered in this course
  • describe the evolution of cloud including hardware, software, and server virtualization
  • identify cloud software security measures including security principles and testing
  • classify different types of web services including CAAS, IAAS, MAAS, PAAS, and SAAS
  • recognize the risks and threats involved in cloud computing
  • identify the different service provider risks including backdoor spoofing
  • identify the importance of the physical location of the data center hosting the cloud software
  • identify the importance of OpenSource software in cloud infrastructure
  • describe how security policy implementation mitigates cloud security challenges
  • describe the importance of encryption in and out of the cloud
  • describe business high availability and continuity techniques
  • apply BCDR planning in various scenarios
  • summarize the key concepts covered in this course

Overview/Description

Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you値l learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.



Target

Prerequisites: none

Cloud Security Administration: Introduction

Course Number:
it_socsaddj_01_enus
Lesson Objectives

Cloud Security Administration: Introduction

  • discover the key concepts covered in this course
  • describe cloud administration and management
  • describe security base parameters and recall what creates baselines
  • describe the service stack of cloud operation as it maps to customer business requirements
  • recognize the core architecture of cloud and its importance for data security
  • describe cloud under compliance and the need to comply with the attesting bodies
  • recognize the concepts of data handling, hardware, software and breach planning, and secure environment
  • describe audit and compliance keeping services stacks in mind
  • define integration of security services as a service or offering
  • identify the building blocks of designing security plans and infrastructure development
  • summarize the key concepts covered in this course

Overview/Description

While importing data or running workloads in the cloud, it is important to ensure security and consider various associated risks. There are regulatory certifications that help ensure that all assets in the cloud are safe and that all procedures have been implemented to protect the client's intellectual rights and data. In this course, you値l examine different government regulations, compliance, and e-frameworks. In addition, you'll learn about audit and cloud certification that can help customers understand the type of workload running in the cloud.



Target

Prerequisites: none

Cloud Security Administration: Regulatory Conformance

Course Number:
it_socsaddj_06_enus
Lesson Objectives

Cloud Security Administration: Regulatory Conformance

  • discover the key concepts covered in this course
  • list common legislation conflicts and compliance issues
  • describe data protection guidelines including ISO/IEC 27015:2015, 27002, and EU data protection
  • recognize the e-Discovery process
  • describe internal and external audits and identify various types of audits and audit scope
  • describe standards, such as internal ISMS and ISO 27001:2013
  • identify the purpose, types, and common components of service level agreements
  • define risk profile, appetite, and risk management
  • recognize concepts relating to contract management and its key components
  • describe supply chain risk, CSA CCM, and ISO 28000:2007
  • summarize the key concepts covered in this course

Overview/Description

While importing data or running workloads on the cloud, it's important to ensure security and be aware of risks. In this course, you'll learn about various cloud regulatory certifications that help ensure that all cloud assets are safe and all procedures have been implemented to protect client data and intellectual rights. You'll also explore the e-Discover process, cloud auditing, service level agreements, and supply chain management.



Target

Prerequisites: none

Close Chat Live