Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CCSK Cert Prep: 2 Infrastructure Security for Cloud

Description

Learn how to secure cloud-based services as well as you would secure on-premises IT service environments and make progress in your preparations for the CCSK Cert Prep exam.

Tags

Syllabus

Syllabus IntroductionInfrastructure securityWhat you should know1. Software-Defined NetworkingSoftware-defined networking (SDN) overviewCreating a virtual private cloud (VPC)Configuring SDN routingPeered VPC connectionsConfiguring VPC peering2. Cloud Network Infrastructure SecurityNetwork security access control lists (ACLs)Managing network ACLsVirtual private networks (VPNs) and the cloudConfiguring a cloud Client-to-Site VPNSecure cloud management strategiesSecuring cloud administration3. Cloud Application Workload SecurityCommon application attacksIdentity and access management (IAM)Configuring IAM to support application securityProtecting data at rest in the cloudServerless and containerized applicationsEnabling HTTPS web application bindings4. Business Continuity in the CloudCloud disaster recovery planningMultiregion cloud resource deploymentsEnabling application load balancingEnabling cloud backup and restoreConclusionNext steps Read more


CCSK Cert Prep: 2 Infrastructure Security for Cloud

Affiliate notice

Learn how to secure cloud-based services as well as you would secure on-premises IT service environments and make progress in your preparations for the CCSK Cert Prep exam.

Syllabus IntroductionInfrastructure securityWhat you should know1. Software-Defined NetworkingSoftware-defined networking (SDN) overviewCreating a virtual private cloud (VPC)Configuring SDN routingPeered VPC connectionsConfiguring VPC peering2. Cloud Network Infrastructure SecurityNetwork security access control lists (ACLs)Managing network ACLsVirtual private networks (VPNs) and the cloudConfiguring a cloud Client-to-Site VPNSecure cloud management strategiesSecuring cloud administration3. Cloud Application Workload SecurityCommon application attacksIdentity and access management (IAM)Configuring IAM to support application securityProtecting data at rest in the cloudServerless and containerized applicationsEnabling HTTPS web application bindings4. Business Continuity in the CloudCloud disaster recovery planningMultiregion cloud resource deploymentsEnabling application load balancingEnabling cloud backup and restoreConclusionNext steps Read more