Video accessible from your Account page after purchase.
6+ Hours of Video Instruction
Master end-to-end cloud security by learning how to protect data, secure cloud platforms, and safeguard applications with industry-leading cloud security frameworks and best practices.
This comprehensive cloud security course provides expert training to protect every layer of the cloud environment. You will learn how to secure cloud data throughout its entire lifecycle--from creation and storage to usage, sharing, archiving, and destruction. Gain practical skills in data classification, data obfuscation, and key and certificate management to enforce strong data security policies and maintain compliance.
You will explore cloud platform and infrastructure security, including designing secure physical data centers, network architectures, virtualization, cloud compute and storage components, and management planes. Learn to identify vulnerabilities, mitigate risks, and develop effective business continuity and disaster recovery plans to ensure resilient cloud operations.
The course also covers essential cloud application security topics such as secure software development lifecycles (SDLC), threat modeling, OWASP API security, secure coding techniques, and managing third-party software risks. You will master cloud identity and access management (IAM) solutions such as federated identity, single sign-on (SSO), multifactor authentication (MFA), cloud access security brokers (CASBs), and secrets management to safeguard access and protect sensitive resources.
Learn How to:
Who Should Take This Course
This course is ideal for IT professionals, cloud security specialists, system administrators, cloud architects, developers, and anyone responsible for securing cloud environments. Its also perfect for those preparing for cloud security certifications or looking to deepen their understanding of cloud data protection, infrastructure security, application security, and identity management.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Course Introduction
Lesson 1: The Cloud Data Lifecycle
Phase 1: Create
Phase 2: Store
Phase 3: Use
Phase 4: Share
Phase 5: Archive
Phase 6: Destroy
Cloud Data Flows
Lesson 2: Cloud Data Security
Concepts of Cloud Data Security
Data Obfuscation
Information Rights Management
Keys, Secrets, and Certificate Management
Data Discovery
Data Classification and Policy
Auditability, Traceability, and Accountability
Lesson 3: Cloud Infrastructure and Platform Components
Physical Cloud Environments
Network Cloud Environments
Cloud Communications
Core Cloud Compute Resources
Cloud Virtualization Resources
Core Cloud Storage Components
Management Plane Cloud Solutions
Lesson 4: Data Center Design and Risk Analysis
Secure Data Center Logical Design
Physical Data Center Design
Data Center Environmental Design
Design Resilient Environments
Cloud Infrastructure Risk Assessment
Cloud Vulnerabilities, Threats, and Attacks
Cloud Infrastructure Risk Mitigation Strategies
Lesson 5: Cloud Business Continuity Planning
Business Continuity Planning
Business Impact Analysis
Backup and Restore Policies
Disaster Recovery Planning
Disaster Recovery Plan Testing Strategies
Lesson 6: Application Security Awareness and Life Cycles
Cloud Application Architecture Elements
Cloud Development
SDLC Business Requirements and Phases
Common Software Vulnerabilities
Software Threat Modeling Methods
Secure Coding Methodologies
Software Configuration Management and Versioning
Lesson 7: Software Assurance and Validation
Functional vs. Non-functional Testing
Security Testing Methodologies
Abuse Case Testing
OWASP API Security
Supply Chain Management
Third-party Software Management
Lesson 8: Identity and Access Management Solutions
Cloud IAM Services
Federated Identity
Identity Providers
Single Sign-on
Multi-factor Authentication
Cloud Access Security Brokers
Managed Security Service Providers
Secrets Management
Summary
Next steps