Internet And Network Technologies
Securing CloudOps Deployments
Securing CloudOps Deployments: Implementing Multi-cloud Security
Securing CloudOps Deployments: Security Standards for Multi-cloud

Securing CloudOps Deployments: Implementing Multi-cloud Security

Course Number:
it_coscodxdj_02_enus
Lesson Objectives

Securing CloudOps Deployments: Implementing Multi-cloud Security

  • discover the key concepts covered in this course
  • recall AWS Cloud Security services and features that can be used to secure workloads and applications in the cloud
  • configure AWS Security Hub to automate security checks, manage security findings, and identify the highest priority security issues across AWS environments
  • create and configure symmetric and asymmetric keys using AWS KMS to control encryption across AWS
  • list the security products provided by Azure that can be used to protect data, applications, and infrastructure when implementing layered security and defense in depth strategies across identity, data, hosts, and networks
  • implement Azure Active Directory and Seamless Single Sign-On to automatically sign in users
  • recognize the Google Security Model and Google services that can be used to fulfil the security, policy, and regulatory compliance requirements of cloud deployments
  • set up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform
  • recognize the need for securing containers and recommended cloud container security best practices to consider when securing container usage in the cloud
  • harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine
  • encrypt Kubernetes Secrets at the application layer using keys that are managed in Cloud Key Management Service
  • summarize the key concepts covered in this course

Overview/Description

Azure, AWS, and Google Cloud Platform provide various security services to secure access, applications, data, infrastructures, and deployments in the cloud. In this course, you'll explore the security services provided by AWS Cloud Security for securing workloads and applications, as well as the Azure security products that can be used to protect data, applications, and infrastructures. You'll explore the Google Security Model, the security services provided by Google, why you need to secure containers, and recommended cloud container security best practices for securing container usage in the cloud. You'll move on to learn about how configure AWS Security Hub, create and configure symmetric and asymmetric keys using AWS KMS, and implement Azure Active Directory and Seamless Single Sign-On. Finally, you'll examine how to set up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform, harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine, and how to encrypt Kubernetes secrets at the application layer.



Target

Prerequisites: none

Securing CloudOps Deployments: Security Standards for Multi-cloud

Course Number:
it_coscodxdj_01_enus
Lesson Objectives

Securing CloudOps Deployments: Security Standards for Multi-cloud

  • discover the key concepts covered in this course
  • recognize the key principles and strategies for securing the enterprise cloud
  • describe recommended practices and models for perimeter security that can help enterprises develop consistent and effective approaches to cloud security
  • recall the role and characteristics of a cloud security framework and classify the key cloud audit methods
  • specify the appropriate choices for security mechanisms and recognize options that need to be configured for security mechanisms on both the service and client side
  • recognize prominent intrusion detection techniques that are used to manage cloud computing and security challenges
  • recall approaches that can be adopted to overcome the impacts of security challenges in multi-cloud environments
  • identify security challenges that need to be considered when using multiple cloud providers and recognize best practices that enterprises can adopt to significantly improve the security of multi-cloud deployments
  • recognize approaches of securing CloudOps platforms that can help in building secure pipelines, middleware, and infrastructure for multi-cloud applications
  • recall security issues of public, private, and hybrid cloud models that need to be considered by cloud architects when designing cloud solutions
  • specify the steps that cloud service customers should take to evaluate and manage the security and privacy of the cloud services from the perspective of mitigating risks and delivering the appropriate level of support
  • summarize the key concepts covered in this course

Overview/Description

Securing multi-cloud deployments and CloudOps platforms involves managing the security and privacy of your cloud services. In this course, you'll explore the key principles and strategies for securing the enterprise cloud, recommended practices and models for perimeter security, and how to choose appropriate security mechanisms. You'll examine the configurable options for security mechanisms on both service and client side, the prominent intrusion detection techniques for managing cloud computing and security challenges, and prominent cloud audit methods. Next, you'll learn approaches for overcoming the impacts of security challenges in multi-cloud environments, best practices for improving the security of multi-cloud deployments, and how to secure CloudOps platforms to build secure pipelines, middleware, and infrastructure for multi-cloud applications. Finally, you'll explore issues a cloud architect should consider when designing cloud solutions and cloud service consumers should evaluate and manage the security and privacy of cloud services.



Target

Prerequisites: none

Close Chat Live