![]() |
Cloud Security For It Professionals
![]() Cloud Security For It Professionals Published 7/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 427.02 MB | Duration: 2h 25m Introduction to Cloud Security with AWS: Concepts, Tools & Best Practices What you'll learn Cloud Computing Identity & Access Management (IAM) in Cloud Network Security Data Protection Application Security Threat Detection Logging and Monitoring Requirements Enthusiastic about learning about learning Cloud Security Description In today's digital landscape, organizations are rapidly migrating to cloud platforms, but with that comes new and evolving security challenges. Cloud Security for IT Professionals is designed to equip IT professionals, students, and career changers with the essential knowledge and skills to secure cloud environments effectively.This course offers a practical, vendor-neutral approach while also referencing leading platforms like AWS, Azure, and Google Cloud. You will learn the core principles of cloud security, including identity and access management (IAM), data protection, network security, application security, threat detection, logging and monitoring, and the shared responsibility model.What Will You Learn?Understand key cloud security concepts and the shared responsibility modelConfigure access control using IAM, RBAC, and ABACSecuring network traffic through virtual private cloud (VPC)Apply encryption techniques and secure sensitive dataImplement logging, monitoring, and threat detection strategiesIdentify common cloud security threats and how to mitigate themExplore tools and services across AWSAlign cloud security practices with compliance and audit requirementsWho Should Enroll:IT auditors, compliance analysts, and GRC specialistsDevelopers and engineers responsible for securing cloud deploymentsAnyone preparing for cloud or security certifications (e.g., CCSP, AWS Security Specialty)By the end of this course, you'll have a solid foundation to confidently secure cloud environments and understand the risks and responsibilities involved. Whether you're starting a new role or enhancing your current skill set, this course will give you the clarity and confidence to work securely in the cloud. Overview Section 1: Introduction to Cloud Computing Lecture 1 Understanding Cloud Computing Lecture 2 On-Premise Model Lecture 3 Cloud Computing Model Lecture 4 Benefits of Cloud Computing Lecture 5 Data Centres Lecture 6 What is a Server Lecture 7 Services Provided by Servers Lecture 8 Deployment Models Lecture 9 Service Models Lecture 10 Key Services in Cloud Eco System Lecture 11 Introduction to Virtual Machines Lecture 12 What are Containers Lecture 13 Understanding Serverless Computing Section 2: Cloud Security Lecture 14 Introduction to Cloud Security Lecture 15 Identity and Access Management (IAM) Lecture 16 Create AWS Account Lecture 17 IAM Users Lecture 18 IAM Groups Lecture 19 IAM Roles Lecture 20 IAM Policy Lecture 21 Access Control Models: RBAC vs ABAC Section 3: Data Protection Lecture 22 Introduction to Data Protection Lecture 23 Data Segmentation Lecture 24 Data Encryption Lecture 25 Key Management Lecture 26 Secrets Management Lecture 27 Data Loss Prevention Section 4: Network Security Lecture 28 Securing Network Boundaries Lecture 29 Virtual Private Cloud (VPC) Lecture 30 Network Firewalls Lecture 31 Security Groups Section 5: Application Security Lecture 32 Introduction to Application Security Lecture 33 Secure Code Practices Lecture 34 Functional Application Tests Lecture 35 Static Application Security Test (SAST) Section 6: Logging and Monitoring Lecture 36 Introduction to Logging and Monitoring Lecture 37 Log Events in Cloud Lecture 38 Logging Pipeline Lecture 39 CloudTrail and CloudWatch Integration Lecture 40 Configuring Logging Pipelines I Lecture 41 Configuring Logging Pipelines II Section 7: Threat Detection in Cloud Lecture 42 Introduction to Threat Detection Lecture 43 Types of Threats in Cloud Environment Lecture 44 Security Information and Event Management (SIEM) Lecture 45 Cloud Security Best Practices Aspiring cloud or cybersecurity professionals,Developers and engineers responsible for securing cloud deployments,IT auditors, compliance analysts, and GRC specialists,Anyone preparing for cloud or security certifications Цитата:
|
Часовой пояс GMT +3, время: 10:10. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot