Security Technologies & Automation Techniques
Intermediate
- 13 videos | 1h 16m 36s
- Includes Assessment
- Earns a Badge
Security is an absolutely critical part of cloud deployments and must be configured correctly so valid users can access resources. In this course, you will explore a number of topics, including how to implement data classification in the cloud, secure cloud resources with segmentation, encryption, and audits. Learn how to enable multifactor authentication, and security services. Automate cloud security configuration. Explore the impact of cloud security. Troubleshoot authentication, cloud PKI, cloud ACLs, and cloud security vulnerabilities. Finally as a scenario exercise, you will find a security configuration that works at rest, in the cloud, and in transit.
WHAT YOU WILL LEARN
-
Specify the correct level of cloud security based upon data classificationUse segmentation to correctly encapsulate areas of a cloud network into safe zonesDefine the data and network cloud components that need encryption to meet safety standardsChoose the cloud auditing standards that meet with the compliance level of an organizationRecognize the situations where multifactor authentication is requiredEnable cloud security services that protect cloud resourcesUse appropriate tools to handle different cloud security situations
-
Describe the scope of impact that security services will have on the behavior of the cloud resourcesTroubleshoot authentication issuesTroubleshoot certificate-related issuesTroubleshoot issues related to users, roles, and aclsTroubleshoot vulnerabilities in cloud security configurationSelect the best options for a security plan based on a scenario
IN THIS COURSE
-
5m 29sAfter completing this video, you will be able to specify the correct level of cloud security based on data classification. FREE ACCESS
-
5m 14sIn this video, you will learn how to use segmentation to correctly create safe zones in a cloud network. FREE ACCESS
-
4m 47sIn this video, you will learn about the data and network cloud components that need to be encrypted to meet safety standards. FREE ACCESS
-
3m 32sDuring this video, you will learn how to choose the cloud auditing standards that meet the compliance level of an organization. FREE ACCESS
-
4m 20sAfter completing this video, you will be able to recognize the situations where multifactor authentication is required. FREE ACCESS
-
6m 51sFind out how to enable cloud security services that protect cloud resources. FREE ACCESS
-
4m 29sDuring this video, you will learn how to use appropriate tools to handle different cloud security situations. FREE ACCESS
-
6mAfter completing this video, you will be able to describe the scope of impact that security services will have on the behavior of cloud resources. FREE ACCESS
-
5m 5sIn this video, learn how to troubleshoot authentication issues. FREE ACCESS
-
9m 45sDuring this video, you will learn how to troubleshoot issues related to certificates. FREE ACCESS
-
10m 12sLearn how to troubleshoot issues related to users, roles, and access control lists. FREE ACCESS
-
8m 59sLearn how to troubleshoot vulnerabilities in cloud security configurations. FREE ACCESS
-
1m 53sIn this video, learn how to select the best security options based on a scenario. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.