Cloud Platform Security: Platform & Infrastructure Security

Cloud Security    |    Intermediate
  • 8 videos | 52m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 28 users Rating 4.2 of 28 users (28)
The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe network functionality and technologies including sdn
    List the key regulations used to protect datacenter facilities
    Define identification, authentication, and authorization for resources
  • Recognize different concepts related to object storage and management plans
    Describe countermeasure strategies including uptime automation of controls and access controls
    Define configuration and data life cycle automation
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 31s
  • 7m 14s
    Upon completion of this video, you will be able to describe network functionality and technologies, including SDN. FREE ACCESS
  • Locked
    3.  Physical and Environmental Protections
    9m 6s
    Upon completion of this video, you will be able to list the key regulations used to protect data center facilities. FREE ACCESS
  • Locked
    4.  Virtualization System Controls
    8m 55s
    In this video, you will learn about identification, authentication, and authorization for resources. FREE ACCESS
  • Locked
    5.  Cloud Storage
    4m 50s
    Upon completion of this video, you will be able to recognize different concepts related to object storage and management plans. FREE ACCESS
  • Locked
    6.  Cloud Countermeasure Strategies
    15m 1s
    After completing this video, you will be able to describe countermeasure strategies including automation of controls and access controls. FREE ACCESS
  • Locked
    7.  System and Communication Protections
    5m 4s
    Find out how to define configuration and data life cycle automation. FREE ACCESS
  • Locked
    8.  Course Summary
    31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.5 of 22 users Rating 4.5 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 33 users Rating 4.4 of 33 users (33)
Rating 4.7 of 28 users Rating 4.7 of 28 users (28)
Rating 4.6 of 64 users Rating 4.6 of 64 users (64)