CompTIA Cloud+: Cloud Network Security
CompTIA
| Intermediate
- 13 videos | 1h 21m 33s
- Includes Assessment
- Earns a Badge
Having a secure cloud environment is crucial for ensuring system and data integrity and security. Cloud environments have numerous methods for meeting these security needs. In this course, you'll learn how to secure a network in a cloud environment using network segmentation, network protocols, and network services. Next, you'll learn how to monitor the security of a network environment using log and event monitoring and how to harden the network environment. Then, you'll move on to examine the available network security tools that can be used to perform network penetration tests, such as vulnerability scanners and port scanners. You'll also explore how to use these security tools to perform vulnerability assessments. Finally, you'll learn about the purpose of a risk register and how to prioritize the deployment and installation of security patches. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how to secure a network in a cloud environment using network segmentationDescribe how to secure a network in a cloud environment using network protocolsDescribe how to secure a network in a cloud environment using network servicesDescribe how to monitor the security of a network environment using log and event monitoringDescribe how to harden a network environmentDescribe network security tools that can be used to perform network penetration tests, such as vulnerability and port scanners
-
Describe how to perform a vulnerability assessment using common methodsDescribe methods for deploying and installing security patchesDescribe the purpose of a risk register and how to prioritize the application of patchesDescribe the impact of security tools on systems and services and the effects of cloud service models on security implementationDemonstrate how to create a virtual network in the cloud and segment it by adding subnetsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 55sIn this video, you’ll learn more about the course and the instructor. In this course, you’ll learn that the CompTIA Cloud+ certification is targeted at IT infrastructure specialist audiences who want to develop multi-vendor skills in the areas of cloud computing. You’ll discover a secure cloud environment is crucial for ensuring system and data integrity and security. You’ll learn how to secure a network in cloud environments using network segmentation, network protocols, and network services. FREE ACCESS
-
4m 26sIn this video, you’ll learn more about how network segmentation can be used in a cloud environment to simply create smaller networks, which can provide isolation or separation of networks. You’ll learn that once you have the network configuration you need; you can start to place the appropriate host systems in the appropriate subnets. You’ll also learn the benefits of implementing this approach. FREE ACCESS
-
12m 31sIn this video, you’ll learn more about commonly used protocols for cloud-based services with respect to their security considerations. You’ll learn that the use of some protocols are dependent on the services you choose to run in your network, while some are made available to the network by the provider. This means you don’t have to implement them yourselves. This may include the use of the domain name system or DNS protocol. FREE ACCESS
-
11m 13sIn this video, you’ll learn more about methods used to secure cloud-based solutions using various network services. You’ll learn about a characteristic application known as its state, which refers to its condition or its quality of being at any given time. You’ll learn that the various processes part of an application will operate in either a stateless or a stateful mode. FREE ACCESS
-
3m 30sIn this video, you’ll learn more about improving the security of your cloud network through logging, analysis, and event monitoring. You’ll learn these are practices that have to be carried out in a cloud environment. If a provider is responsible for the underlying infrastructure of your subscription, you’ll find they aren’t responsible for any kind of solution you implement on that infrastructure. FREE ACCESS
-
7m 51sIn this video, you’ll learn more about the process of hardening a cloud network. You’ll learn this refers to the practice of disabling whatever is unnecessary to the services you provide. Hardening is a basic method of improving the level of security for your systems and mitigating the risk of becoming compromised by ensuring that its configuration and its settings are appropriate with respect to the services that the system provides. FREE ACCESS
-
5m 27sIn this video, you’ll learn more about the basic types of security tools that can be used to perform various tests to assess your overall level of network security in the cloud. You can assess your security by scanning applications, services, and other processes. You’ll discover these can identify weaknesses or vulnerabilities. You’ll learn that most of your efforts will be focused on identifying weaknesses in software, services, and configuration. FREE ACCESS
-
9m 3sIn this video, you’ll learn more about performing vulnerability assessments against your cloud services. Once you have an understanding of vulnerabilities that might exist, you'll be better able to react to vulnerabilities before they're identified by an attacker. You’ll also learn why it’s important to document and report these vulnerabilities. This is to assure there’s a history of which weaknesses were identified and what was done to address them. FREE ACCESS
-
6m 6sIn this video, you’ll learn more about deploying and installing security patches and updates. This is a significant component when it comes to maintaining security. You’ll learn that as new features are developed, they are quickly exploited. You’ll find as an application matures, vulnerabilities are identified and addressed through the process of applying updates. The longer an application is in use, the more stable it becomes. You’ll learn how to acquire, distribute, and apply patches. FREE ACCESS
-
5m 36sIn this video, you’ll learn more about implementing a risk register as part of observing security best practices. You’ll learn this involves the use of security tools and utilities designed to track and measure risk in a single centralized manner. This allows you to avoid having different mechanisms being implemented in different ways in different locations. Centralized management allows for greater efficiency and results in the ability to save on resources, time, and effort. FREE ACCESS
-
6m 57sIn this video, you’ll learn more about cloud-based security tools and the impact they have on systems and service models. You’ll learn that one of your first considerations should be where the tool comes from. These tools may be implemented within your subscription or already available by default. Or, you may need third party tools from other companies or open-source tools. You’ll learn about specific examples and considerations. FREE ACCESS
-
6m 6sIn this video, you’ll watch a demo. In this demo, you’ll learn how to create a virtual network. Next, you’ll learn about subnets within that virtual network in a cloud service. Learning this will help you isolate systems from each other when necessary. You’ll use Microsoft Azure. You’ll access a Resource group, which contains the resources you’ll be using. Next, you’ll name your network and configure an address. Finally, you’ll create a subnet. FREE ACCESS
-
52sIn this video, you’ll summarize what you’ve learned in this course. You learned to secure a cloud network with network segmentation, network protocols, and network services. You learned about monitoring network security with log and event monitoring, hardening a network, and common security tools. You also learned about common methods for performing a vulnerability assessment. Finally, you also learned about deploying and installing security patches. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.