CompTIA Cloud+: Cloud Security Best Practices

CompTIA Cloud+    |    Intermediate
  • 15 videos | 1h 46m 46s
  • Includes Assessment
  • Earns a Badge
There are many best practices for ensuring that cloud environments are secure from all sorts of risks that administrators can apply to ensure lowered risk and smoother operations. In this course, learn about cloud security best practices, beginning with the principle of least privilege (PoLP), zero trust, vulnerability assessments, network security tools, and security tools and service models. Next, explore benchmarking, hardening, and vulnerability management and cloud encryption best practices. Finally, examine secrets management, API security best practices, container security, object storage security, and file storage security. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the principle of least privilege (polp) and its role in securing cloud environments
    Identify zero trust principles and best practices
    Describe how to perform a vulnerability assessment using popular methods
    List network security tools that can be used to perform network penetration tests
    Recognize the impact of security tools on systems and services and the effects of cloud service models on implementing security
    Identify benchmarking characteristics and best practices in the cloud
    Outline security hardening practices in the cloud
  • Recognize best practices for encryption in the cloud
    Identify characteristics and practices for enacting secrets management in the cloud
    Describe best practices for implementing api security in the cloud
    Recognize container security considerations in the cloud
    Identify characteristics of cloud object storage security
    Outline characteristics of cloud file storage security risks and mitigations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 3s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 43s
    Through this video, you will be able to outline the principle of least privilege (PoLP) and its role in securing cloud environments. FREE ACCESS
  • Locked
    3.  Zero Trust
    7m 49s
    After completing this video, you will be able to identify zero trust principles and best practices. FREE ACCESS
  • Locked
    4.  Vulnerability Assessments
    7m 52s
    Upon completion of this video, you will be able to describe how to perform a vulnerability assessment using popular methods. FREE ACCESS
  • Locked
    5.  Network Security Tools
    8m 9s
    In this video, we will list network security tools that can be used to perform network penetration tests. FREE ACCESS
  • Locked
    6.  Security Tools and Service Models
    10m 56s
    Through this video, you will be able to recognize the impact of security tools on systems and services and the effects of cloud service models on implementing security. FREE ACCESS
  • Locked
    7.  Benchmarking
    7m 34s
    After completing this video, you will be able to identify benchmarking characteristics and best practices in the cloud. FREE ACCESS
  • Locked
    8.  Hardening
    8m 23s
    Upon completion of this video, you will be able to outline security hardening practices in the cloud. FREE ACCESS
  • Locked
    9.  Cloud Encryption Best Practices
    10m 44s
    Through this video, you will be able to recognize best practices for encryption in the cloud. FREE ACCESS
  • Locked
    10.  Secrets Management
    7m 2s
    In this video, we will identify characteristics and practices for enacting secrets management in the cloud. FREE ACCESS
  • Locked
    11.  API Security Best Practices
    7m 56s
    After completing this video, you will be able to describe best practices for implementing API security in the cloud. FREE ACCESS
  • Locked
    12.  Container Security
    5m 25s
    Through this video, you will be able to recognize container security considerations in the cloud. FREE ACCESS
  • Locked
    13.  Object Storage Security
    7m 18s
    Upon completion of this video, you will be able to identify characteristics of cloud object storage security. FREE ACCESS
  • Locked
    14.  File Storage Security
    5m 58s
    After completing this video, you will be able to outline characteristics of cloud file storage security risks and mitigations. FREE ACCESS
  • Locked
    15.  Course Summary
    54s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 6 users Rating 4.5 of 6 users (6)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.7 of 96 users Rating 4.7 of 96 users (96)