Can Cloud and Security Be Used in the Same Sentence
Offered By: YouTube
Course Description
Overview
Explore cloud security concepts and best practices in this 51-minute conference talk from Louisville InfoSec 2013. Delve into the fundamentals of cloud computing, its unique characteristics, and the security challenges it presents. Learn about essential security measures such as two-factor authentication, security groups, and encryption. Discover strategies for maintaining control over your cloud environment, including creating gold images, implementing change processes, and adopting a DevOps mentality. Examine real-world security incidents like the Verizon data breach and discuss methods for keeping enterprise environments secure. Gain insights into cloud-specific concerns, attack mitigation techniques, and the importance of backups. Understand how cloud adoption can impact cash flow, metrics, and server efficiency. Conclude with a Q&A session addressing audience inquiries about cloud security.
Syllabus
Introduction
Questions
Goals
What is the cloud
How is the cloud different
What does a cloud have
Do I have a firewall
Twofactor authentication
Security concerns
What you control
Security Groups
Attack Back
Software Only Network
Cloud Security
Verizon Day Breach
Keeping Enterprise Environment Internal
Cash Flow
Metrics
Security
Encryption
Create a Gold Image
Change Process
Reboot
Backups
DevOps mentality
Proof of concept
Reducing server wait time
Any questions
Related Courses
Startup EngineeringStanford University via Coursera Developing Scalable Apps in Java
Google via Udacity Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera Cloud Networking
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera