Cloud Platform Security: System Monitoring & Protection

Cloud Security    |    Intermediate
  • 13 videos | 1h 29m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 12 users Rating 4.8 of 12 users (12)
Cloud system monitoring is used to proactively identify and evaluate security vulnerabilities and allow organizations to explore options to protect their assets using available cloud platform tools. In this course, you'll learn how to proactively shield cloud infrastructure by monitoring organizational security using built-in Azure and Google Cloud Platform (GCP) security tools and services. You'll examine how to use monitoring tools like security information in Azure, Google Cloud Armor, Google Cloud Scanner, and the VM placement algorithm to prevent threats.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how monitoring works in a cloud infrastructure
    Identify how to protect data, apps, and infrastructure quickly with built-in security services in azure
    Recognize ways to perform monitoring in gcp
    Recognize cloud infrastructure security flaws
    Identify the common risks in security infrastructure
    List common techniques for tackling threats
  • List azure cloud tools
    Describe how to protect your services against denial of service and web attacks
    Use google cloud security scanner you automatically scan app engine, compute engine, and google kubernetes engine apps for common vulnerabilities
    Describe how the vm placement algorithm works
    Describe how to implement threat prevention mechanisms using vm placement algorithm
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 56s
  • 7m 58s
    After completing this video, you will be able to describe how monitoring works in a cloud infrastructure. FREE ACCESS
  • Locked
    3.  Using Built-in Security Information in Azure
    4m 20s
    In this video, you will learn how to protect data, apps, and infrastructure quickly with built-in security services in Azure. FREE ACCESS
  • Locked
    4.  Monitoring Cloud Infrastructure Security in GCP
    6m 36s
    After completing this video, you will be able to recognize ways to monitor in GCP. FREE ACCESS
  • Locked
    5.  Common Types of Vulnerabilities
    11m 57s
    After completing this video, you will be able to recognize security flaws in cloud infrastructure. FREE ACCESS
  • Locked
    6.  Common Security Vulnerabilities
    15m 36s
    Find out how to identify common risks in security infrastructure. FREE ACCESS
  • Locked
    7.  Combating Threats
    8m 57s
    After completing this video, you will be able to list common techniques for dealing with threats. FREE ACCESS
  • Locked
    8.  Tools to Combat Threats in Azure
    7m 25s
    After completing this video, you will be able to list Azure cloud tools. FREE ACCESS
  • Locked
    9.  Google Cloud Armor - Defending Your Services
    6m 7s
    After completing this video, you will be able to describe how to protect your services against denial of service and web attacks. FREE ACCESS
  • Locked
    10.  Cloud Security Scanner
    7m 21s
    During this video, you will learn how to use Google Cloud Security Scanner to automatically scan App Engine, Compute Engine, and Google Kubernetes Engine apps for common vulnerabilities. FREE ACCESS
  • Locked
    11.  VM Placement Algorithm
    6m 50s
    After completing this video, you will be able to describe how the VM placement algorithm works. FREE ACCESS
  • Locked
    12.  Preventing Threats with the VM Placement Algorithm
    3m 11s
    After completing this video, you will be able to describe how to implement threat prevention mechanisms using a VM placement algorithm. FREE ACCESS
  • Locked
    13.  Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 2 users Rating 4.0 of 2 users (2)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.1 of 18 users Rating 4.1 of 18 users (18)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)