Security Configurations & Compliance Controls
Intermediate
- 12 videos | 1h 26m 2s
- Includes Assessment
- Earns a Badge
The most prevalent concern with cloud computing is the question of security. Let's explore technologies used to secure cloud resources. In this course, you will see how to create a trustworthy cloud, use Public Key Infrastructure and tunneling protocols. See how to harden security for the cloud, based on cloud models. Examine cloud access control, authorization, authentication, and identification technologies. Study how to manage the account lifecycle in the cloud, and how to configure cloud policy settings. As a scenario exercise, you will identify which areas need enhanced security policies and their preferred solutions.
WHAT YOU WILL LEARN
-
Recognize the qualities of a well defined cloud security policySpecify how to secure a cloud infrastructure using certificate-based technologiesCompare different tunneling protocols that can be used to connect to a cloud environment securelyIdentify the different techniques used reduce the vulnerabilities of the resources in a cloud environmentDescribe the different security issues that are dependent upon the cloud service and deployment modelsChoose the appropriate authentication technology to identify users connecting to the cloud
-
Compare different access control options available to cloud administratorsChoose the correct level of access to use to secure cloud resourcesConfigure authorization of cloud resourcesIdentify the correct processing techniques for ensuring safety of cloud user accountsConfigure account settings in a cloud environment for best securityChoose the correct security settings to apply in the cloud to meet business needs
IN THIS COURSE
-
7m 54sAfter completing this video, you will be able to recognize the qualities of a well-defined cloud security policy. FREE ACCESS
-
7m 40sUpon completion of this video, you will be able to specify how to secure a cloud infrastructure using certificate-based technologies. FREE ACCESS
-
8m 37sIn this video, you will compare different tunneling protocols that can be used to connect to a cloud environment securely. FREE ACCESS
-
7m 20sDuring this video, you will learn how to identify the different techniques used to reduce the vulnerabilities of the resources in a cloud environment. FREE ACCESS
-
8m 59sAfter completing this video, you will be able to describe the different security issues that depend on the cloud service and deployment models. FREE ACCESS
-
7m 35sFind out how to choose the appropriate authentication technology to identify users connecting to the cloud. FREE ACCESS
-
6m 45sDuring this video, you will learn how to compare different access control options available to cloud administrators. FREE ACCESS
-
5m 21sDuring this video, you will learn how to choose the correct level of access to use to secure cloud resources. FREE ACCESS
-
6m 4sIn this video, you will configure authorization for cloud resources. FREE ACCESS
-
8m 6sLearn how to identify the correct processing techniques for ensuring the safety of cloud user accounts. FREE ACCESS
-
8m 9sIn this video, find out how to configure account settings for best security in a cloud environment. FREE ACCESS
-
3m 31sLearn how to choose the correct security settings to apply in the cloud to meet business needs. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.