CCSP 2019: Data Center Security
CCSP
| Intermediate
- 16 videos | 1h 50s
- Includes Assessment
- Earns a Badge
Risk management ensures that realized threats have minimal impact on business operations. This 16-video course explores how security controls address security objectives, as well as the IT audit process, and how to configure high availability for cloud services. This course helps learners prepare for the Certified Cloud Security Professional exam. Key concepts covered include: risk as it applies to cloud services and underlying infrastructure, and risk analysis and management posture regarding cloud computing; integration of information security and risk management activities into a formal framework; threats and attack vectors associated with cloud services and infrastructure; and threat mitigation and attack handling techniques. Next, learn to generate an Azure storage account shared access signature, how to deploy an Azure network security group; and how to configure an Azure role-based access control (RBAC) to control virtual machine (VM) management. Finally, learn about certain auditing techniques and responsibilities and various types of audit reports. Learn how to conduct an Azure VM failover test; to deploy an Azure VM scale set; and to deploy an Azure load balancer.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe risk as it applies to cloud services and underlying infrastructure and adopt a risk analysis and management posture regarding cloud computingOutline the integration of information security and risk management activities into a formal frameworkDescribe known threats and attack vectors associated with cloud services and infrastructureDescribe threat mitigation and attack handling techniques including acl, designing in security, and adopting security measuresGenerate a microsoft azure storage account shared access signatureDeploy a microsoft azure network security groupConfigure microsoft azure rbac to control virtual machine management
-
Recognize the difference between authentication and authorizationDefine auditing techniques and responsibilities within certain scopes, including asset access, asset status, deletions, archiving, and reportingList various types of audit reports such as statement on standards for attestation engagements, security operations center, and international standard on assurance engagementsEnable business continuity by replicating virtual machines to secondary regionsConduct a microsoft azure virtual machine failover testDeploy a microsoft azure virtual machine scale setDeploy a microsoft azure load balancerSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 7s
-
5m 13sAfter completing this video, you will be able to describe risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computing. FREE ACCESS
-
4m 3sIn this video, you will learn how to outline the integration of information security and risk management activities into a formal framework. FREE ACCESS
-
4m 28sUpon completion of this video, you will be able to describe known threats and attack vectors associated with cloud services and infrastructure. FREE ACCESS
-
5m 30sUpon completion of this video, you will be able to describe threat mitigation and attack handling techniques including access control lists, designing in security, and adopting security measures. FREE ACCESS
-
2m 37sDuring this video, you will learn how to generate a shared access signature for a Microsoft Azure storage account. FREE ACCESS
-
4m 24sLearn how to deploy a network security group in Microsoft Azure. FREE ACCESS
-
3m 47sIn this video, learn how to configure Microsoft Azure RBAC to control virtual machine management. FREE ACCESS
-
4m 11sUpon completion of this video, you will be able to recognize the difference between authentication and authorization. FREE ACCESS
-
5m 10sDuring this video, you will learn how to define auditing techniques and responsibilities within certain scopes, including asset access, asset status, deletions, archiving, and reporting. FREE ACCESS
-
3m 5sAfter completing this video, you will be able to list various types of audit reports such as the Statement on Standards for Attestation Engagements, the Security Operations Center, and the International Standard on Assurance Engagements. FREE ACCESS
-
2m 39sIn this video, you will learn how to replicate virtual machines to secondary regions to enable business continuity. FREE ACCESS
-
4m 10sDuring this video, you will learn how to test a Microsoft Azure virtual machine failover. FREE ACCESS
-
4m 30sDuring this video, you will learn how to deploy a Microsoft Azure virtual machine scale set. FREE ACCESS
-
3m 53sLearn how to deploy a load balancer on Microsoft Azure. FREE ACCESS
-
1m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.