Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Tags
Syllabus
Introduction
- Making your cloud deployments secure
- What you should know
- Cloud security guidance
- Essential characteristics
- Cloud services
- Infrastructure as a service
- Platform as a service
- Software as a service
- Deployment models
- Hypervisors and visualization
- Microsoft Azure
- Command-line access to Azure
- Amazon Web Services
- Command-line access to Amazon
- Google Apps
- Security as a service
- Cloud provider SECaaS
- An insight into Rapid7's SECaaS
- Incidents in the cloud
- Anatomy of a service failure
- Anatomy of a business failure
- Incident response
- Azure recommendations on incident management
- Cloud resilience
- Unauthorised access to buckets by anyone
- Unauthorized account access to buckets
- Searching for account keys
- Architecting governance and risk
- Legal, compliance, and audit
- Information governance
- Application security
- Deploying and operating applications
- Cryptography foundations
- Data security and encryption
- Identity in the cloud
- Controlling access to cloud objects
- Setting up access control in AWS
- Logging and monitoring in the cloud
- VM monitoring with Azure
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/f5b0e9d4dc56.jpeg)
Cybersecurity with Cloud Computing
Affiliate notice
-
TypeOnline Course
-
Provider
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Introduction
- Making your cloud deployments secure
- What you should know
- Cloud security guidance
- Essential characteristics
- Cloud services
- Infrastructure as a service
- Platform as a service
- Software as a service
- Deployment models
- Hypervisors and visualization
- Microsoft Azure
- Command-line access to Azure
- Amazon Web Services
- Command-line access to Amazon
- Google Apps
- Security as a service
- Cloud provider SECaaS
- An insight into Rapid7's SECaaS
- Incidents in the cloud
- Anatomy of a service failure
- Anatomy of a business failure
- Incident response
- Azure recommendations on incident management
- Cloud resilience
- Unauthorised access to buckets by anyone
- Unauthorized account access to buckets
- Searching for account keys
- Architecting governance and risk
- Legal, compliance, and audit
- Information governance
- Application security
- Deploying and operating applications
- Cryptography foundations
- Data security and encryption
- Identity in the cloud
- Controlling access to cloud objects
- Setting up access control in AWS
- Logging and monitoring in the cloud
- VM monitoring with Azure
- Next steps
Tags
Loading...
Saving...
Loading...