Securing CloudOps Deployments: Implementing Multi-cloud Security

CloudOps    |    Intermediate
  • 12 videos | 55m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Azure, AWS, and Google Cloud Platform provide various security services to secure access, applications, data, infrastructures, and deployments in the cloud. In this course, you'll explore the security services provided by AWS Cloud Security for securing workloads and applications, as well as the Azure security products that can be used to protect data, applications, and infrastructures. You'll explore the Google Security Model, the security services provided by Google, why you need to secure containers, and recommended cloud container security best practices for securing container usage in the cloud. You'll move on to learn about how configure AWS Security Hub, create and configure symmetric and asymmetric keys using AWS KMS, and implement Azure Active Directory and Seamless Single Sign-On. Finally, you'll examine how to set up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform, harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine, and how to encrypt Kubernetes secrets at the application layer.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recall aws cloud security services and features that can be used to secure workloads and applications in the cloud
    Configure aws security hub to automate security checks, manage security findings, and identify the highest priority security issues across aws environments
    Create and configure symmetric and asymmetric keys using aws kms to control encryption across aws
    List the security products provided by azure that can be used to protect data, applications, and infrastructure when implementing layered security and defense in depth strategies across identity, data, hosts, and networks
    Implement azure active directory and seamless single sign-on to automatically sign in users
  • Recognize the google security model and google services that can be used to fulfil the security, policy, and regulatory compliance requirements of cloud deployments
    Set up vpn between a check point security gateway and cloud vpn on google cloud platform
    Recognize the need for securing containers and recommended cloud container security best practices to consider when securing container usage in the cloud
    Harden security and restrict network access to the control plane and nodes of google kubernetes engine
    Encrypt kubernetes secrets at the application layer using keys that are managed in cloud key management service
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 23s
  • 7m 50s
    After completing this video, you will be able to recall AWS Cloud Security services and features that can be used to secure workloads and applications in the cloud. FREE ACCESS
  • Locked
    3.  Configuring AWS Security Hub
    6m 8s
    During this video, you will learn how to configure AWS Security Hub to automate security checks, manage security findings, and identify the highest priority security issues across AWS environments. FREE ACCESS
  • Locked
    4.  Creating Keys Using KMS
    5m 16s
    In this video, find out how to create and configure symmetric and asymmetric keys using AWS KMS to control encryption across AWS. FREE ACCESS
  • Locked
    5.  Azure Security Products
    4m 50s
    Upon completion of this video, you will be able to list the security products provided by Azure that can be used to protect data, applications, and infrastructure when implementing layered security and defense in depth strategies across identity, data, hosts, and networks. FREE ACCESS
  • Locked
    6.  Implementing Azure AD
    3m 28s
    Learn how to implement Azure Active Directory and Seamless Single Sign-On to sign in users automatically. FREE ACCESS
  • Locked
    7.  Google Security Model
    5m 40s
    Upon completion of this video, you will be able to recognize the Google Security Model and Google services that can fulfill the security, policy, and regulatory compliance requirements of cloud deployments. FREE ACCESS
  • Locked
    8.  Setting up Security Gateway
    5m 38s
    Learn how to set up a VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform. FREE ACCESS
  • Locked
    9.  Container Security
    5m 21s
    After completing this video, you will be able to recognize the need for securing containers and recommended cloud container security best practices to consider when securing container usage in the cloud. FREE ACCESS
  • Locked
    10.  Kubernetes Hardening
    5m 13s
    Learn how to harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine. FREE ACCESS
  • Locked
    11.  Using Cloud KMS
    3m 8s
    During this video, you will learn how to encrypt Kubernetes Secrets at the application layer using keys that are managed in Cloud Key Management Service. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 58s
    8ae6a1d0-b157-4f62-8ae1-c803d2a9c669 FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.7 of 673 users Rating 4.7 of 673 users (673)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 14 users Rating 4.1 of 14 users (14)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.6 of 272 users Rating 4.6 of 272 users (272)