Cloud and Automation for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the skills you need as a cybersecurity analyst to identify the threats and vulnerabilities associated with operating in the cloud.
Operating with the cloud has created new vectors of attacks for hackers to leverage against you. In this course, Cloud and Automation for CompTIA CySA+, you’ll learn to identify the threats and vulnerabilities associated with operating in the cloud, and using automation to help you against attackers. First, you’ll explore the benefits of using automation within your environment to help better control your security profile. Next, you’ll discover which aspects of connecting to the cloud you should be looking out for that could compromise your infrastructure. Finally, you’ll learn how different techniques can be used to protect your resources and the connectivity to your cloud service provider. When you’re finished with this course, you’ll have the skills and knowledge of a cybersecurity analyst needed to identify the threats and vulnerabilities associated with operating in the cloud, and using automation to help you in your battle against attackers.
Operating with the cloud has created new vectors of attacks for hackers to leverage against you. In this course, Cloud and Automation for CompTIA CySA+, you’ll learn to identify the threats and vulnerabilities associated with operating in the cloud, and using automation to help you against attackers. First, you’ll explore the benefits of using automation within your environment to help better control your security profile. Next, you’ll discover which aspects of connecting to the cloud you should be looking out for that could compromise your infrastructure. Finally, you’ll learn how different techniques can be used to protect your resources and the connectivity to your cloud service provider. When you’re finished with this course, you’ll have the skills and knowledge of a cybersecurity analyst needed to identify the threats and vulnerabilities associated with operating in the cloud, and using automation to help you in your battle against attackers.
Taught by
Dale Meredith
Related Courses
Evaluación de peligros y riesgos por fenómenos naturalesUniversidad Nacional Autónoma de México via Coursera Internet Security
openHPI Planning a Security Incident Response
Microsoft via edX Cyber Security
CEC via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam