CCSP 2019: Data Center Security

CCSP    |    Intermediate
  • 16 videos | 1h 50s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 85 users Rating 4.7 of 85 users (85)
Risk management ensures that realized threats have minimal impact on business operations. This 16-video course explores how security controls address security objectives, as well as the IT audit process, and how to configure high availability for cloud services. This course helps learners prepare for the Certified Cloud Security Professional exam. Key concepts covered include: risk as it applies to cloud services and underlying infrastructure, and risk analysis and management posture regarding cloud computing; integration of information security and risk management activities into a formal framework; threats and attack vectors associated with cloud services and infrastructure; and threat mitigation and attack handling techniques. Next, learn to generate an Azure storage account shared access signature, how to deploy an Azure network security group; and how to configure an Azure role-based access control (RBAC) to control virtual machine (VM) management. Finally, learn about certain auditing techniques and responsibilities and various types of audit reports. Learn how to conduct an Azure VM failover test; to deploy an Azure VM scale set; and to deploy an Azure load balancer.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe risk as it applies to cloud services and underlying infrastructure and adopt a risk analysis and management posture regarding cloud computing
    Outline the integration of information security and risk management activities into a formal framework
    Describe known threats and attack vectors associated with cloud services and infrastructure
    Describe threat mitigation and attack handling techniques including acl, designing in security, and adopting security measures
    Generate a microsoft azure storage account shared access signature
    Deploy a microsoft azure network security group
    Configure microsoft azure rbac to control virtual machine management
  • Recognize the difference between authentication and authorization
    Define auditing techniques and responsibilities within certain scopes, including asset access, asset status, deletions, archiving, and reporting
    List various types of audit reports such as statement on standards for attestation engagements, security operations center, and international standard on assurance engagements
    Enable business continuity by replicating virtual machines to secondary regions
    Conduct a microsoft azure virtual machine failover test
    Deploy a microsoft azure virtual machine scale set
    Deploy a microsoft azure load balancer
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 7s
  • 5m 13s
    After completing this video, you will be able to describe risk as it applies to cloud services and underlying infrastructure, and adopt a risk analysis and management posture regarding cloud computing. FREE ACCESS
  • Locked
    3.  Risk Frameworks
    4m 3s
    In this video, you will learn how to outline the integration of information security and risk management activities into a formal framework. FREE ACCESS
  • Locked
    4.  Threat and Attack
    4m 28s
    Upon completion of this video, you will be able to describe known threats and attack vectors associated with cloud services and infrastructure. FREE ACCESS
  • Locked
    5.  Security Controls
    5m 30s
    Upon completion of this video, you will be able to describe threat mitigation and attack handling techniques including access control lists, designing in security, and adopting security measures. FREE ACCESS
  • Locked
    6.  Cloud Storage Security
    2m 37s
    During this video, you will learn how to generate a shared access signature for a Microsoft Azure storage account. FREE ACCESS
  • Locked
    7.  Cloud Network Protection
    4m 24s
    Learn how to deploy a network security group in Microsoft Azure. FREE ACCESS
  • Locked
    8.  Virtual Machine Management
    3m 47s
    In this video, learn how to configure Microsoft Azure RBAC to control virtual machine management. FREE ACCESS
  • Locked
    9.  Authentication and Authorization
    4m 11s
    Upon completion of this video, you will be able to recognize the difference between authentication and authorization. FREE ACCESS
  • Locked
    10.  Auditing
    5m 10s
    During this video, you will learn how to define auditing techniques and responsibilities within certain scopes, including asset access, asset status, deletions, archiving, and reporting. FREE ACCESS
  • Locked
    11.  Types of Audit Reports
    3m 5s
    After completing this video, you will be able to list various types of audit reports such as the Statement on Standards for Attestation Engagements, the Security Operations Center, and the International Standard on Assurance Engagements. FREE ACCESS
  • Locked
    12.  Virtual Machine High Availability
    2m 39s
    In this video, you will learn how to replicate virtual machines to secondary regions to enable business continuity. FREE ACCESS
  • Locked
    13.  Failover Testing
    4m 10s
    During this video, you will learn how to test a Microsoft Azure virtual machine failover. FREE ACCESS
  • Locked
    14.  Cloud Virtual Machine Grouping
    4m 30s
    During this video, you will learn how to deploy a Microsoft Azure virtual machine scale set. FREE ACCESS
  • Locked
    15.  Cloud Application Load Balancing
    3m 53s
    Learn how to deploy a load balancer on Microsoft Azure. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Rating 4.7 of 78 users Rating 4.7 of 78 users (78)
Rating 4.5 of 133 users Rating 4.5 of 133 users (133)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 74 users Rating 4.7 of 74 users (74)
Rating 4.6 of 148 users Rating 4.6 of 148 users (148)
Rating 4.7 of 273 users Rating 4.7 of 273 users (273)