Final Exam: Cloud Security Architect

Intermediate
  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Final Exam: Cloud Security Architect will test your knowledge and application of the topics presented throughout the Cloud Security Architect track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.

WHAT YOU WILL LEARN

  • Define iam methodologies in cloud
    specify access and segregation of the access by roles
    list the groups and permissions in gcp/azure
    apply and configure nsgs in vnets
    describe azure key vaults
    apply cloud hardware security module in gcp
    identify the ways on how to prevent vulnerabilities in azure proactively
    describe the process of configuring iam in azure
    list the specific tools within azure cloud
    identify responsibility model to achieve the compliance
    configure hardware security module in azure
    identify ways to perform monitoring in gcp
    recognize the features of responsibility model in azure
    use acls to provide custom access
    identify the features of gcp cloud in gcp
    identify the common risks in security infrastructure
    identify the specific tools within google cloud
    identify the ways on how to prevent vulnerabilities in gcp proactively
    specify the security levels of cloud infrastructure
    use hardware encryption to secure hardware data
    describe the methodology to implement preventing mechanism using vm replacement algorithm
    list the specific tools within google cloud
    describe the applications of acl in azure
    recognize the ways to react to vulnerabilities in gcp
    describe the process that google uses to setup their security using cloud infrastructure
    recall understanding the built siem system in azure
    describe functions of vpc
    recognize how to recover data using cdm
    configure secure vpc in gcp
    describe the functions of the advisor tool
  • recognize the security flaws within a cloud infrastructure
    define security groups and subnet concepts in azure
    identify how to secure your cloud deployments
    describe the policies and ways to meet compliance
    describe how vm placement algorithm works
    identify the ways to react to vulnerabilities in gcp
    list the ways to control the access on cloud infrastructure network
    use azure active directory to perform configurations
    distinguish between kms and cryptographic key
    identify ways how to secure content using cloud infrastructure
    identify how to secure cloud storage using acl in gcp
    list the methods to implement acls in gcp and aws
    describe the ways to react to vulnerabilities in gcp
    describe how to recover data using asr
    describe how does monitoring work in a cloud infrastructure
    identify the zones and regions specific to aws and gcp
    define the rules and standards with respect to the cloud security provider
    identify the service controls in gcp
    recognize the methodology to implement preventing mechanism using vm replacement algorithm
    list the various methods to detect vulnerabilities in azure
    list the common techniques around tackling threats
    describe why due diligence is required to complete the audits successfully
    recall how to recover data using cdm
    recognize why due diligence is required to complete the audits successfully
    configure vpc on aws
    describe the ways to react to vulnerabilities in azure
    describe how to recover data using cdm
    describe responsibility model to achieve the compliance
    recall the service used by vpcs including private link, secure endpoints, and direct connect
    describe how iam works on azure

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 50 users Rating 4.5 of 50 users (50)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.3 of 3 users Rating 4.3 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.4 of 145 users Rating 4.4 of 145 users (145)
Rating 4.5 of 1116 users Rating 4.5 of 1116 users (1116)