CompTIA Cloud+: Cloud Network Security

CompTIA    |    Intermediate
  • 13 videos | 1h 21m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 96 users Rating 4.7 of 96 users (96)
Having a secure cloud environment is crucial for ensuring system and data integrity and security. Cloud environments have numerous methods for meeting these security needs. In this course, you'll learn how to secure a network in a cloud environment using network segmentation, network protocols, and network services. Next, you'll learn how to monitor the security of a network environment using log and event monitoring and how to harden the network environment. Then, you'll move on to examine the available network security tools that can be used to perform network penetration tests, such as vulnerability scanners and port scanners. You'll also explore how to use these security tools to perform vulnerability assessments. Finally, you'll learn about the purpose of a risk register and how to prioritize the deployment and installation of security patches. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to secure a network in a cloud environment using network segmentation
    Describe how to secure a network in a cloud environment using network protocols
    Describe how to secure a network in a cloud environment using network services
    Describe how to monitor the security of a network environment using log and event monitoring
    Describe how to harden a network environment
    Describe network security tools that can be used to perform network penetration tests, such as vulnerability and port scanners
  • Describe how to perform a vulnerability assessment using common methods
    Describe methods for deploying and installing security patches
    Describe the purpose of a risk register and how to prioritize the application of patches
    Describe the impact of security tools on systems and services and the effects of cloud service models on security implementation
    Demonstrate how to create a virtual network in the cloud and segment it by adding subnets
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 55s
    In this video, you’ll learn more about the course and the instructor. In this course, you’ll learn that the CompTIA Cloud+ certification is targeted at IT infrastructure specialist audiences who want to develop multi-vendor skills in the areas of cloud computing. You’ll discover a secure cloud environment is crucial for ensuring system and data integrity and security. You’ll learn how to secure a network in cloud environments using network segmentation, network protocols, and network services. FREE ACCESS
  • 4m 26s
    In this video, you’ll learn more about how network segmentation can be used in a cloud environment to simply create smaller networks, which can provide isolation or separation of networks. You’ll learn that once you have the network configuration you need; you can start to place the appropriate host systems in the appropriate subnets. You’ll also learn the benefits of implementing this approach. FREE ACCESS
  • Locked
    3.  Cloud Network Protocols
    12m 31s
    In this video, you’ll learn more about commonly used protocols for cloud-based services with respect to their security considerations. You’ll learn that the use of some protocols are dependent on the services you choose to run in your network, while some are made available to the network by the provider. This means you don’t have to implement them yourselves. This may include the use of the domain name system or DNS protocol. FREE ACCESS
  • Locked
    4.  Cloud Network Services
    11m 13s
    In this video, you’ll learn more about methods used to secure cloud-based solutions using various network services. You’ll learn about a characteristic application known as its state, which refers to its condition or its quality of being at any given time. You’ll learn that the various processes part of an application will operate in either a stateless or a stateful mode. FREE ACCESS
  • Locked
    5.  Network Flow Analysis and Event Monitoring
    3m 30s
    In this video, you’ll learn more about improving the security of your cloud network through logging, analysis, and event monitoring. You’ll learn these are practices that have to be carried out in a cloud environment. If a provider is responsible for the underlying infrastructure of your subscription, you’ll find they aren’t responsible for any kind of solution you implement on that infrastructure. FREE ACCESS
  • Locked
    6.  Network Hardening
    7m 51s
    In this video, you’ll learn more about the process of hardening a cloud network. You’ll learn this refers to the practice of disabling whatever is unnecessary to the services you provide. Hardening is a basic method of improving the level of security for your systems and mitigating the risk of becoming compromised by ensuring that its configuration and its settings are appropriate with respect to the services that the system provides. FREE ACCESS
  • Locked
    7.  Network Security Tools
    5m 27s
    In this video, you’ll learn more about the basic types of security tools that can be used to perform various tests to assess your overall level of network security in the cloud. You can assess your security by scanning applications, services, and other processes. You’ll discover these can identify weaknesses or vulnerabilities. You’ll learn that most of your efforts will be focused on identifying weaknesses in software, services, and configuration. FREE ACCESS
  • Locked
    8.  Vulnerability Assessment
    9m 3s
    In this video, you’ll learn more about performing vulnerability assessments against your cloud services. Once you have an understanding of vulnerabilities that might exist, you'll be better able to react to vulnerabilities before they're identified by an attacker. You’ll also learn why it’s important to document and report these vulnerabilities. This is to assure there’s a history of which weaknesses were identified and what was done to address them. FREE ACCESS
  • Locked
    9.  Security Patches
    6m 6s
    In this video, you’ll learn more about deploying and installing security patches and updates. This is a significant component when it comes to maintaining security. You’ll learn that as new features are developed, they are quickly exploited. You’ll find as an application matures, vulnerabilities are identified and addressed through the process of applying updates. The longer an application is in use, the more stable it becomes. You’ll learn how to acquire, distribute, and apply patches. FREE ACCESS
  • Locked
    10.  Risk Registers and Patch Management Prioritization
    5m 36s
    In this video, you’ll learn more about implementing a risk register as part of observing security best practices. You’ll learn this involves the use of security tools and utilities designed to track and measure risk in a single centralized manner. This allows you to avoid having different mechanisms being implemented in different ways in different locations. Centralized management allows for greater efficiency and results in the ability to save on resources, time, and effort. FREE ACCESS
  • Locked
    11.  Security Tools and the Impacts of Service Models
    6m 57s
    In this video, you’ll learn more about cloud-based security tools and the impact they have on systems and service models. You’ll learn that one of your first considerations should be where the tool comes from. These tools may be implemented within your subscription or already available by default. Or, you may need third party tools from other companies or open-source tools. You’ll learn about specific examples and considerations. FREE ACCESS
  • Locked
    12.  Creating Subnets in a Cloud Virtual Network
    6m 6s
    In this video, you’ll watch a demo. In this demo, you’ll learn how to create a virtual network. Next, you’ll learn about subnets within that virtual network in a cloud service. Learning this will help you isolate systems from each other when necessary. You’ll use Microsoft Azure. You’ll access a Resource group, which contains the resources you’ll be using. Next, you’ll name your network and configure an address. Finally, you’ll create a subnet. FREE ACCESS
  • Locked
    13.  Course Summary
    52s
    In this video, you’ll summarize what you’ve learned in this course. You learned to secure a cloud network with network segmentation, network protocols, and network services. You learned about monitoring network security with log and event monitoring, hardening a network, and common security tools. You also learned about common methods for performing a vulnerability assessment. Finally, you also learned about deploying and installing security patches. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 86 users Rating 4.6 of 86 users (86)
Rating 4.4 of 125 users Rating 4.4 of 125 users (125)
Rating 4.5 of 50 users Rating 4.5 of 50 users (50)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 64 users Rating 4.6 of 64 users (64)
Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 4.8 of 29 users Rating 4.8 of 29 users (29)