Cloud Platform Security: System Monitoring & Protection
Cloud Security
| Intermediate
- 13 videos | 1h 29m 14s
- Includes Assessment
- Earns a Badge
Cloud system monitoring is used to proactively identify and evaluate security vulnerabilities and allow organizations to explore options to protect their assets using available cloud platform tools. In this course, you'll learn how to proactively shield cloud infrastructure by monitoring organizational security using built-in Azure and Google Cloud Platform (GCP) security tools and services. You'll examine how to use monitoring tools like security information in Azure, Google Cloud Armor, Google Cloud Scanner, and the VM placement algorithm to prevent threats.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how monitoring works in a cloud infrastructureIdentify how to protect data, apps, and infrastructure quickly with built-in security services in azureRecognize ways to perform monitoring in gcpRecognize cloud infrastructure security flawsIdentify the common risks in security infrastructureList common techniques for tackling threats
-
List azure cloud toolsDescribe how to protect your services against denial of service and web attacksUse google cloud security scanner you automatically scan app engine, compute engine, and google kubernetes engine apps for common vulnerabilitiesDescribe how the vm placement algorithm worksDescribe how to implement threat prevention mechanisms using vm placement algorithmSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 56s
-
7m 58sAfter completing this video, you will be able to describe how monitoring works in a cloud infrastructure. FREE ACCESS
-
4m 20sIn this video, you will learn how to protect data, apps, and infrastructure quickly with built-in security services in Azure. FREE ACCESS
-
6m 36sAfter completing this video, you will be able to recognize ways to monitor in GCP. FREE ACCESS
-
11m 57sAfter completing this video, you will be able to recognize security flaws in cloud infrastructure. FREE ACCESS
-
15m 36sFind out how to identify common risks in security infrastructure. FREE ACCESS
-
8m 57sAfter completing this video, you will be able to list common techniques for dealing with threats. FREE ACCESS
-
7m 25sAfter completing this video, you will be able to list Azure cloud tools. FREE ACCESS
-
6m 7sAfter completing this video, you will be able to describe how to protect your services against denial of service and web attacks. FREE ACCESS
-
7m 21sDuring this video, you will learn how to use Google Cloud Security Scanner to automatically scan App Engine, Compute Engine, and Google Kubernetes Engine apps for common vulnerabilities. FREE ACCESS
-
6m 50sAfter completing this video, you will be able to describe how the VM placement algorithm works. FREE ACCESS
-
3m 11sAfter completing this video, you will be able to describe how to implement threat prevention mechanisms using a VM placement algorithm. FREE ACCESS
-
1m
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.