Cloud Security Administration: Hardened Cloud Security
Cloud Security
| Beginner
- 10 videos | 45m 25s
- Includes Assessment
- Earns a Badge
An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software. In this course, you'll learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how to harden physical hosts and help reduce the attack surface by using a virtual guestIdentify the importance of control over physical security and assetsDefine data outsourcing and how to prevent loss of control on dataSpecify how to provide cloud security while keeping track of limitations including vulnerability of infrastructure, platform, and service
-
Define deceptive information and how to protect dataRecognize the importance of encrypted queries and protecting personal dataDifferentiate between privacy and information systemsDescribe the life cycle of securing data in cloudSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
5m 42sUpon completion of this video, you will be able to describe how to harden physical hosts and reduce the attack surface by using a virtual guest. FREE ACCESS
-
6m 5sIn this video, you will learn about the importance of controlling physical security and assets. FREE ACCESS
-
4m 56sIn this video, you will learn about data outsourcing and how to prevent loss of control over your data. FREE ACCESS
-
6m 44sAfter completing this video, you will be able to specify how to provide cloud security while keeping track of limitations including vulnerability of infrastructure, platform, and service. FREE ACCESS
-
5m 23sIn this video, you will learn about how to identify and protect yourself from deceptive information. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to recognize the importance of encrypted queries and protecting personal data. FREE ACCESS
-
6m 12sFind out how to differentiate between privacy and information security. FREE ACCESS
-
3m 53sUpon completion of this video, you will be able to describe the life cycle of securing data in the cloud. FREE ACCESS
-
46s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.