YoVDO

Cybersecurity with Cloud Computing

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Cloud Computing Courses Cryptography Courses Identity Management Courses Data Security Courses Incident Management Courses Amazon Web Services Courses

Course Description

Overview

Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.

Syllabus

Introduction
  • Making your cloud deployments secure
  • What you should know
1. Cloud Foundations
  • Cloud security guidance
  • Essential characteristics
  • Cloud services
  • Infrastructure as a service
  • Platform as a service
  • Software as a service
  • Deployment models
  • Hypervisors and visualization
2. Looking at the Clouds
  • Microsoft Azure
  • Command-line access to Azure
  • Amazon Web Services
  • Command-line access to Amazon
  • Google Apps
  • Security as a service
  • Cloud provider SECaaS
  • An insight into Rapid7's SECaaS
3. Cloud Flaws, Incidents. and Failures
  • Incidents in the cloud
  • Anatomy of a service failure
  • Anatomy of a business failure
  • Incident response
  • Azure recommendations on incident management
  • Cloud resilience
4. Hands-On with Cloud Flaws
  • Unauthorised access to buckets by anyone
  • Unauthorized account access to buckets
  • Searching for account keys
5. Cloud Security Management
  • Architecting governance and risk
  • Legal, compliance, and audit
  • Information governance
  • Application security
  • Deploying and operating applications
6. Cloud Security Capabilities
  • Cryptography foundations
  • Data security and encryption
  • Identity in the cloud
  • Controlling access to cloud objects
  • Setting up access control in AWS
  • Logging and monitoring in the cloud
  • VM monitoring with Azure
What's Next
  • Next steps

Taught by

Malcolm Shore

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network