CompTIA Cloud+: Secure Access in the Cloud

CompTIA Cloud+    |    Intermediate
  • 13 videos | 1h 18m 52s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
The cloud, by its very nature, is a remote technology, with servers providing services and data residing in data centers all over the world. Secure access to these resources is an absolute necessity. In this course, explore secure access in the cloud, beginning with identity and access management (IAM), access control lists (ACLs), role-based access control (RBAC), group-based access control (GBAC), and cloud IAM best practices. Next, learn about software development kit (SDK) security, common language infrastructure (CLI) security, and web portal security. Finally, examine secure access and APIs, Secure Shell (SSH), Remote Desktop Protocol (RDP), and bastion hosts. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the fundamentals of identity and access management (iam) in the cloud
    Recognize how access control lists (acls) are used to secure services in a cloud environment
    Describe role-based access control (rbac) and how it's used to secure access in the cloud
    Identify the fundamentals of group-based access control (gbac) and how it's used to secure access in the cloud
    Recognize best practices for managing identity and access management (iam) in the cloud
    Describe the considerations and best practices for ensuring secure access for software development kits (sdks) in the cloud
  • Recognize characteristics of common language infrastructure (cli) and key security considerations in the cloud
    Identify the basics of maintaining web portal security in the cloud
    Outline secure access using secure shell (ssh)
    Describe secure access using remote desktop protocol (rdp)
    Recognize the fundamentals of secure access using bastion hosts
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 10m 5s
    After completing this video, you will be able to outline the fundamentals of identity and access management (IAM) in the cloud. FREE ACCESS
  • Locked
    3.  Access Control Lists (ACLs)
    8m 11s
    Through this video, you will be able to recognize how access control lists (ACLs) are used to secure services in a cloud environment. FREE ACCESS
  • Locked
    4.  Role-Based Access Control (RBAC)
    6m 43s
    Upon completion of this video, you will be able to describe role-based access control (RBAC) and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    5.  Group-Based Access Control (GBAC)
    6m 20s
    In this video, we will identify the fundamentals of group-based access control (GBAC) and how it's used to secure access in the cloud. FREE ACCESS
  • Locked
    6.  Cloud IAM Best Practices
    7m 50s
    Through this video, you will be able to recognize best practices for managing identity and access management (IAM) in the cloud. FREE ACCESS
  • Locked
    7.  Software Development Kit (SDK) Security
    6m 53s
    In this video, we will describe the considerations and best practices for ensuring secure access for software development kits (SDKs) in the cloud. FREE ACCESS
  • Locked
    8.  Common Language Infrastructure (CLI) Security
    6m 31s
    Through this video, you will be able to recognize characteristics of common language infrastructure (CLI) and key security considerations in the cloud. FREE ACCESS
  • Locked
    9.  Web Portal Security
    7m 29s
    Upon completion of this video, you will be able to identify the basics of maintaining web portal security in the cloud. FREE ACCESS
  • Locked
    10.  Secure Access and Secure Shell (SSH)
    6m 40s
    In this video, we will outline secure access using Secure Shell (SSH). FREE ACCESS
  • Locked
    11.  Secure Access and Remote Desktop Protocol (RDP)
    5m 10s
    After completing this video, you will be able to describe secure access using Remote Desktop Protocol (RDP). FREE ACCESS
  • Locked
    12.  Secure Access and Bastion Hosts
    4m 53s
    Through this video, you will be able to recognize the fundamentals of secure access using bastion hosts. FREE ACCESS
  • Locked
    13.  Course Summary
    1m
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)