Home > Store

Cloud Data, Platform and Applications Security (Video Course)

Register your product to gain access to bonus material or receive a coupon.

Cloud Data, Platform and Applications Security (Video Course)

Online Video

Description

  • Copyright 2026
  • Edition: 1st
  • Online Video
  • ISBN-10: 0-13-557425-0
  • ISBN-13: 978-0-13-557425-6

6+ Hours of Video Instruction

Master end-to-end cloud security by learning how to protect data, secure cloud platforms, and safeguard applications with industry-leading cloud security frameworks and best practices.

This comprehensive cloud security course provides expert training to protect every layer of the cloud environment. You will learn how to secure cloud data throughout its entire lifecycle--from creation and storage to usage, sharing, archiving, and destruction. Gain practical skills in data classification, data obfuscation, and key and certificate management to enforce strong data security policies and maintain compliance.

You will explore cloud platform and infrastructure security, including designing secure physical data centers, network architectures, virtualization, cloud compute and storage components, and management planes. Learn to identify vulnerabilities, mitigate risks, and develop effective business continuity and disaster recovery plans to ensure resilient cloud operations.

The course also covers essential cloud application security topics such as secure software development lifecycles (SDLC), threat modeling, OWASP API security, secure coding techniques, and managing third-party software risks. You will master cloud identity and access management (IAM) solutions such as federated identity, single sign-on (SSO), multifactor authentication (MFA), cloud access security brokers (CASBs), and secrets management to safeguard access and protect sensitive resources.

Learn How to:

  • Secure cloud data across all lifecycle phases including creation, storage, usage, sharing, archiving, and destruction
  • Classify data, apply data obfuscation, and manage keys, secrets, and certificates effectively
  • Design and protect cloud platforms and infrastructure including physical data centers, network environments, virtualization, compute, and storage resources
  • Identify cloud vulnerabilities, assess risks, and implement mitigation strategies to safeguard cloud environments
  • Develop and execute robust business continuity and disaster recovery plans tailored for cloud infrastructures
  • Apply cloud application security best practices including secure software development lifecycle (SDLC), threat modeling, secure coding, and OWASP API security
  • Manage third-party software risks and enforce software assurance and validation processes
  • Implement cloud identity and access management (IAM) solutions, such as federated identity, single sign-on (SSO), multi-factor authentication (MFA), and cloud access security brokers (CASBs)
  • Enforce strict access controls and secrets management to protect sensitive cloud resources

Who Should Take This Course

This course is ideal for IT professionals, cloud security specialists, system administrators, cloud architects, developers, and anyone responsible for securing cloud environments. Its also perfect for those preparing for cloud security certifications or looking to deepen their understanding of cloud data protection, infrastructure security, application security, and identity management.

About Pearson Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Sample Content

Table of Contents

Course Introduction

Lesson 1: The Cloud Data Lifecycle

        Phase 1: Create

        Phase 2: Store

        Phase 3: Use

        Phase 4: Share

        Phase 5: Archive

        Phase 6: Destroy

        Cloud Data Flows

Lesson 2: Cloud Data Security

        Concepts of Cloud Data Security

        Data Obfuscation

        Information Rights Management

        Keys, Secrets, and Certificate Management

        Data Discovery

        Data Classification and Policy

        Auditability, Traceability, and Accountability

Lesson 3: Cloud Infrastructure and Platform Components

        Physical Cloud Environments

        Network Cloud Environments

        Cloud Communications

        Core Cloud Compute Resources

        Cloud Virtualization Resources

        Core Cloud Storage Components

        Management Plane Cloud Solutions

Lesson 4: Data Center Design and Risk Analysis

        Secure Data Center Logical Design

        Physical Data Center Design

        Data Center Environmental Design

        Design Resilient Environments

        Cloud Infrastructure Risk Assessment

        Cloud Vulnerabilities, Threats, and Attacks

        Cloud Infrastructure Risk Mitigation Strategies

Lesson 5: Cloud Business Continuity Planning

        Business Continuity Planning

        Business Impact Analysis

        Backup and Restore Policies

        Disaster Recovery Planning

        Disaster Recovery Plan Testing Strategies

Lesson 6: Application Security Awareness and Life Cycles

        Cloud Application Architecture Elements

        Cloud Development

        SDLC Business Requirements and Phases

        Common Software Vulnerabilities

        Software Threat Modeling Methods

        Secure Coding Methodologies

        Software Configuration Management and Versioning

Lesson 7: Software Assurance and Validation

        Functional vs. Non-functional Testing

        Security Testing Methodologies

        Abuse Case Testing

        OWASP API Security

        Supply Chain Management

        Third-party Software Management

Lesson 8: Identity and Access Management Solutions

        Cloud IAM Services

        Federated Identity

        Identity Providers

        Single Sign-on

        Multi-factor Authentication

        Cloud Access Security Brokers

        Managed Security Service Providers

        Secrets Management

Summary

Next steps

Updates

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.