The Cloud Security course provides comprehensive coverage of cloud security controls, mechanisms, practices and architecture models. It explores implementation, configuration and combination of cloud security technologies for establishing a cloud security architecture. The course further emphasizes applying cloud security mechanisms to establish sophisticated, custom security controls to prevent and respond to common threats and attacks.
Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Because this course encompasses both the Cloud Professional and Cloud Security Specialist certifications, upon passing the exam you will also receive official Cloud Professional and Cloud Security Specialist digital accreditation certificates and certification badges from Acclaim/Credly, along with an account that can be used to verify your certification status.
The Cloud Security course is comprised of the following 5 course modules, each of which has an estimated completion time of 10 hours:
.png)
Module 1: Fundamental Cloud Computing
.png)
Module 2: Cloud Technology Concepts
.png)
Module 7: Fundamental Cloud Security
Module 8: Advanced Cloud Security
Module 9: Cloud Security Lab
.png)
50 hours of Workbook Lessons & Exercises
.png)
Supporting Video Lessons
.png)
Course Completion Certificate & Badge
.png)
Certification Exam & Practice Questions
.png)
Feature-Rich eLearning Platform
.png)
Interactive Graded Exercises, Self-Test
.png)
Printable PDFs
.png)
Lifetime Access
.png)
Mind Map Poster
.png)
Symbol Legend Poster
This course module provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The module content is divided into a series of modular sections, each of which is accompanied by one or more hands-on exercises.
.png)
Fundamental Cloud Computing Terminology and Concepts
.png)
Basics of Virtualization
.png)
Specific Characteristics that Define a Cloud
.png)
Understanding Elasticity, Resiliency, On-Demand and Measured Usage
.png)
Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services
.png)
Cloud Resource Administrator and Cloud Service Owner Roles
.png)
Cloud Service and Cloud Service Consumer Roles
.png)
Understanding the IaaS, PaaS, SaaS Cloud Delivery Model
.png)
Combining Cloud Delivery Models
.png)
Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models
.png)
Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs
.png)
Formulas for Calculating and Rating SLA Quality of Service Characteristics
This course module explores a range of the most important and relevant technology-related topics that pertain to contemporary cloud computing platforms. The module content does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and containerization.
.png)
Cloud Computing Mechanisms that Establish Architectural Building Blocks
.png)
Virtual Servers, Containers, Ready-Made Environments, Failover Systems and Pay-Per-Use Monitors
.png)
Automated Scaling Listeners, Multi-Device Brokers and Resource Replication
.png)
Understanding How Individual Cloud Computing Mechanisms Support Cloud Characteristics
.png)
An Introduction to Containerization, Container Hosting and Logical Pod Containers
.png)
A Comparison of Containerization and Virtualization
.png)
Cloud Balancing and Cloud Bursting Architectures
.png)
Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions
.png)
Cloud Security Mechanisms used to Counter Threats and Attacks
.png)
Understanding Cloud-Based Security Groups and Hardened Virtual Server Images
.png)
Cloud Service Implementation Mediums (including Web Services and REST Services)
.png)
Cloud Storage Benefits and Challenges, Cloud Storage Services, Technologies and Approaches
.png)
Non-Relational (NoSQL) Storage Compared to Relational Storage
.png)
Cloud Service Testing Considerations and Testing Types
.png)
Service Grids and Autonomic Computing
.png)
Cloud Computing Industry Standards Organizations
This foundational course module provides a well-rounded, end-to-end presentation of essential techniques, mechanisms, patterns and industry technologies for establishing cloud-based security controls and security architectures. The cloud security fundamentals covered in Module 2 are continued by introducing threat categorizations and new cloud security mechanisms.
.png)
Cloud Security Basics
.png)
Common Cloud Security Mechanisms
.png)
Cloud Security Threats
.png)
Cloud Security Threat Categorization Methodology
.png)
Identification and Treatment of Common Threats
.png)
Cloud Network Security Patterns and Supporting Mechanisms
.png)
Securing Network Connections and Cloud Authentication Gateways
.png)
Collaborative Monitoring and Logging
.png)
Independent Cloud Auditing
.png)
Cloud Identity and Access Management Patterns and Supporting Mechanisms
.png)
Federating and Enabling Secure Interoperability among Cloud Consumers
.png)
Trust Assurance Patterns and Supporting Mechanisms
Trust Attestation and Establishing Trustworthiness
This advanced course module covers cloud security mechanisms and architectural design patterns that address data and access control security for virtual machines, as well as trust boundaries, geotagging and BIOS security. The course module also explains common methods used by attackers to breach organizational resources and provides a methodology for countering such attacks. The module concludes by demonstrating the relationship between threats, attacks, and risks via threat modeling.
.png)
Cloud Service Security Patterns and Supporting Mechanisms
.png)
Virtual Machine Platform Protection Patterns
.png)
Considerations for Setting Up Secure Ephemeral Perimeters
.png)
Trusted Cloud Resource Pools and Cloud Resource Access Control
.png)
Permanent Data Access Loss Protection
.png)
Cloud Data Breach Protection
.png)
Isolated Trust Boundaries
.png)
The Attack Lifecycle and the Security Lifecycle
.png)
Proactive Mitigation vs. Incidence Response
.png)
Threats, Vulnerabilities, Impacts from Exploitation
.png)
Threat Modeling, Threats and Mitigations
This course module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered in previous modules. Completing this lab will help highlight areas that require further attention and will help prove proficiency in cloud computing security practices, mechanisms and architectural patterns as they are applied and combined to solve real-world problems.
.png)
Reading Exercise 9.1: Case Study Background IAM in the Cloud
.png)
Lab Exercise 9.2: Cloud Identity and Access Management (IAM) Environment Setup
.png)
Lab Exercise 9.3: PKI in the Cloud
.png)
Lab Exercise 9.4: Budget Banking Data Breach
.png)
Lab Exercise 9.5: Cloud Data Encryption and Key Management
.png)
Lab Exercise 9.6: ACE Telecommunications Move to the Cloud
.png)
Lab Exercise 9.7: Cloud Service Protection Architecture
.png)
Reading Exercise 9.8: Case Study Background Big Box Retailer Breach
.png)
Lab Exercise 9.9: Networking Security
.avif)