Cloud Security Fundamentals: Cloud Infrastructure Security

Cloud Security    |    Beginner
  • 12 videos | 58m 39s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 324 users Rating 4.4 of 324 users (324)
Learners discover how to secure the Cloud Solution Provider (CSP) account from the outset by using best practices and techniques, in this 11-video course. Other infrastructure security concepts such as Integrated Access Manager (IAM), network access control lists (NACLs), firewalls, and web application firewalls (WAFs) are also covered. Begin by learning about designing and planning security controls to ensure adequate protection of resources. Then explore practical aspects of dealing with a cloud service provider and securing the root account, or billing account. The next tutorial focuses on IAM groups and users, which leads into examining IAM policies and permissions. You will learn how to define IAM roles; explore secure management access; and define network access control lists. Learn about secure management access and Secure Shell (SSH) and transport layer security (TLS). Learn how to define NACLs; configure stateful firewalls (which track connections and automatically allow returning traffic) in the cloud; and describe WAFs. In the final tutorial, discover best practices for hardening virtual machines. The concluding exercise asks learners to describe cloud infrastructure security.

WHAT YOU WILL LEARN

  • Design and plan security controls
    Secure the root account
    Configure iam groups and users
    Describe iam policies and permissions
    Define iam roles
    Secure management access
  • Define network access control lists
    Configure stateful firewalls in the cloud
    Describe web application firewalls
    Describe best practices for hardening vms
    Describe cloud infrastructure security

IN THIS COURSE

  • 1m 21s
  • 5m 27s
    In this video, you will design and plan security controls. FREE ACCESS
  • Locked
    3.  Secure the Root Account
    5m 27s
    In this video, find out how to secure the root account. FREE ACCESS
  • Locked
    4.  Identity and Access Management Groups and Users
    5m 31s
    In this video, you will learn how to configure IAM groups and users. FREE ACCESS
  • Locked
    5.  IAM Policies and Permissions
    7m 25s
    After completing this video, you will be able to describe IAM policies and permissions. FREE ACCESS
  • Locked
    6.  IAM Roles
    5m 7s
    Learn how to create IAM roles. FREE ACCESS
  • Locked
    7.  Secure Management Access
    7m 49s
    Learn how to secure management access. FREE ACCESS
  • Locked
    8.  Network Access Control Lists
    3m 27s
    During this video, you will learn how to define network access control lists. FREE ACCESS
  • Locked
    9.  Stateful Firewalls in the Cloud
    3m 18s
    In this video, find out how to configure stateful firewalls in the cloud. FREE ACCESS
  • Locked
    10.  Web Application Firewalls
    7m 54s
    After completing this video, you will be able to describe web application firewalls. FREE ACCESS
  • Locked
    11.  Best Practices for Hardening VMs
    4m 27s
    After completing this video, you will be able to describe best practices for securing VMs. FREE ACCESS
  • Locked
    12.  Exercise: Describing Cloud Infrastructure Security
    1m 27s
    After completing this video, you will be able to describe cloud infrastructure security. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 559 users Rating 4.6 of 559 users (559)
Rating 4.4 of 135 users Rating 4.4 of 135 users (135)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)