This course is designed for those interested to learn the fundamentals of cloud security. Read more.
Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 13 years experience in IT Security.
Access all courses in our library for only $9/month with All Access Pass
Get Started with All Access PassBuy Only This CourseAbout This Course
Who this course is for:
- All levels of IT Security and Networking Professionals
- All new students who are looking transition into cloud security
What you’ll learn:
- The ability to function in a cloud based environment
Requirements:
- Students should have a basic understanding of network and web based security.
- Basic understanding of security architecture is recommended
Cloud Security is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models-software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS) the talk often turns to cloud security. Let’s build in this course.
Our Promise to You
By the end of this course, you will have learned about cloud security fundamentals.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about cloud security fundamentals.
Course Curriculum
Section 1 - Introduction To Cloud Security | |||
Introduction | 00:00:00 | ||
Section 2 - Module 1: Cloud Computing Foundation | |||
Cloud Computing Definitions | 00:00:00 | ||
Cloud Computing Roles | 00:00:00 | ||
Cloud Computing Benefits | 00:00:00 | ||
Drivers For Cloud Computing | 00:00:00 | ||
Define Cloud Computing | 00:00:00 | ||
Cloud Essential Characteristics: Part 1 | 00:00:00 | ||
Cloud Essential Characteristics: Part 2 | 00:00:00 | ||
Cloud Essential Characteristics: Part 3 | 00:00:00 | ||
Cloud Essential Characteristics: Part 4 | 00:00:00 | ||
Cloud Deployment Models | 00:00:00 | ||
Cloud Deployment Organizations | 00:00:00 | ||
Cloud Service Models | 00:00:00 | ||
Cloud And Asset Management | 00:00:00 | ||
Principles Of Enterprise Architecture: Part 1 | 00:00:00 | ||
Principles Of Enterprise Architecture: Part 2 | 00:00:00 | ||
Section 3 - Module 2: Cloud Computing Foundation | |||
Cloud Computing Security And Risk | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 1 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 3 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 4 | 00:00:00 | ||
Cloud Security Concerns - Vulnerabilities | 00:00:00 | ||
Cloud Security Concerns - SLA: Part 1 | 00:00:00 | ||
Cloud Security Concerns - SLA: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 1 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 3 | 00:00:00 | ||
The Stride Threat Model: Part 1 | 00:00:00 | ||
The Stride Threat Model: Part 2 | 00:00:00 | ||
The Treacherous Twelve: Part 1 | 00:00:00 | ||
The Treacherous Twelve: Part 2 | 00:00:00 | ||
The Treacherous Twelve: Part 3 | 00:00:00 | ||
The Treacherous Twelve: Part 4 | 00:00:00 | ||
The Treacherous Twelve: Part 5 | 00:00:00 | ||
The Treacherous Twelve: Part 6 | 00:00:00 | ||
The Treacherous Twelve: Part 7 | 00:00:00 | ||
The Treacherous Twelve: Part 8 | 00:00:00 | ||
The Treacherous Twelve: Part 9 | 00:00:00 | ||
The Treacherous Twelve: Part 10 | 00:00:00 | ||
The Treacherous Twelve: Part 11 | 00:00:00 | ||
The Treacherous Twelve: Part 12 | 00:00:00 |
About This Course
Who this course is for:
- All levels of IT Security and Networking Professionals
- All new students who are looking transition into cloud security
What you’ll learn:
- The ability to function in a cloud based environment
Requirements:
- Students should have a basic understanding of network and web based security.
- Basic understanding of security architecture is recommended
Cloud Security is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models-software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS) the talk often turns to cloud security. Let’s build in this course.
Our Promise to You
By the end of this course, you will have learned about cloud security fundamentals.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about cloud security fundamentals.
Course Curriculum
Section 1 - Introduction To Cloud Security | |||
Introduction | 00:00:00 | ||
Section 2 - Module 1: Cloud Computing Foundation | |||
Cloud Computing Definitions | 00:00:00 | ||
Cloud Computing Roles | 00:00:00 | ||
Cloud Computing Benefits | 00:00:00 | ||
Drivers For Cloud Computing | 00:00:00 | ||
Define Cloud Computing | 00:00:00 | ||
Cloud Essential Characteristics: Part 1 | 00:00:00 | ||
Cloud Essential Characteristics: Part 2 | 00:00:00 | ||
Cloud Essential Characteristics: Part 3 | 00:00:00 | ||
Cloud Essential Characteristics: Part 4 | 00:00:00 | ||
Cloud Deployment Models | 00:00:00 | ||
Cloud Deployment Organizations | 00:00:00 | ||
Cloud Service Models | 00:00:00 | ||
Cloud And Asset Management | 00:00:00 | ||
Principles Of Enterprise Architecture: Part 1 | 00:00:00 | ||
Principles Of Enterprise Architecture: Part 2 | 00:00:00 | ||
Section 3 - Module 2: Cloud Computing Foundation | |||
Cloud Computing Security And Risk | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 1 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 3 | 00:00:00 | ||
Cloud Security Concerns - Risk: Part 4 | 00:00:00 | ||
Cloud Security Concerns - Vulnerabilities | 00:00:00 | ||
Cloud Security Concerns - SLA: Part 1 | 00:00:00 | ||
Cloud Security Concerns - SLA: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 1 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 2 | 00:00:00 | ||
Cloud Security Concerns - Legal: Part 3 | 00:00:00 | ||
The Stride Threat Model: Part 1 | 00:00:00 | ||
The Stride Threat Model: Part 2 | 00:00:00 | ||
The Treacherous Twelve: Part 1 | 00:00:00 | ||
The Treacherous Twelve: Part 2 | 00:00:00 | ||
The Treacherous Twelve: Part 3 | 00:00:00 | ||
The Treacherous Twelve: Part 4 | 00:00:00 | ||
The Treacherous Twelve: Part 5 | 00:00:00 | ||
The Treacherous Twelve: Part 6 | 00:00:00 | ||
The Treacherous Twelve: Part 7 | 00:00:00 | ||
The Treacherous Twelve: Part 8 | 00:00:00 | ||
The Treacherous Twelve: Part 9 | 00:00:00 | ||
The Treacherous Twelve: Part 10 | 00:00:00 | ||
The Treacherous Twelve: Part 11 | 00:00:00 | ||
The Treacherous Twelve: Part 12 | 00:00:00 |