Learning Cybersecurity with Cloud Computing Step by Step
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
27 students enrolled

Learning Cybersecurity with Cloud Computing Step by Step

Cybersecurity with Cloud Computing with Malcolm Shore Discover how to use cybersecurity to mitigate your cloud computing
New
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
27 students enrolled
Created by Nadir Ben Bala
Last updated 8/2020
English
Current price: $55.99 Original price: $79.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Cloud services overview
  • Deployment models
  • Microsoft Azure
Course content
Expand 36 lectures 02:18:03
+ Cybersecurity with Cloud Computing
36 lectures 02:18:03
Essential characteristics
07:17
Cloud services
05:07
Infrastructure as a service
03:31
Platform as a service
02:52
Deployment models
04:44
Hypervisors and visualization
05:00
Microsoft Azure
05:28
Command-line access to Azure
02:22
Amazon Web Services
03:38
Command-line access to Amazon
02:18
Google Apps
06:04
Security as a service
02:02
Cloud provider SECaaS
04:06
An insight into Rapid7's SECaaS
02:03
Incidents in the cloud
03:33
Anatomy of a service failure
03:26
Anatomy of a business failure
03:42
Incident response
06:42
Azure recommendations on incident management
02:00
Cloud resilience
02:19
Unauthorised access to buckets by anyone
01:35
Unauthorized account access to buckets
01:22
Searching for account keys
01:36
Architecting governance and risk
02:32
Legal, compliance, and audit
04:48
Information governance
08:28
Application security
08:20
Cryptography foundations
05:36
Data security and encryption
05:20
Setting up access control in AWS
02:55
Logging and monitoring in the cloud
04:05
VM monitoring with Azure
02:16
Requirements
  • This course is designed for beginners and intermediate levels.
Description

More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.

Topics include:

  • Cloud services overview

  • Deployment models

  • Microsoft Azure

  • Amazon Web Services

  • Google Apps

  • Cloud security risks and failures

  • Identifying unauthorized access

  • Managing cloud security

  • Cloud security capabilities

  • Security as a service (SecaaS)

Who this course is for:
  • Anyone who like to explore Cloud Technology will be benefited with this course. This course is specifically designed for beginners and intermediate levels but advance cloud professionals can also refresh their knowledge and get more details.