Securing Cloud Services



Last updated 12/2014
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 623.17 MB | Duration: 6h 40m
Learn how to securely migrate and maintain cloud based data systems and services.


What you’ll learn
secure network and data infrastructure for migration to a cloud platform
develop a suitable cloud services agreement and maintain data and system security within the cloud
Requirements
no prior experience with cloud services or cloud security required
Description
Data security is as important as ever, and the industry-wide move to cloud-based infrastructure comes with its own requirements and concerns. Throughout this course, expert author David Miller will teach you how to secure and maintain your IT assets in the cloud. You will start by learning how to secure the infrastructure, including risk assessment and management, sensitive data, and data classification. From there, David will show you how to prepare for cloud use, including web app security, security as a service, and security controls. This video tutorial also teaches you about the cloud services agreement, and what you should consider including in your cloud services agreement. Finally, you will learn how to stay secure in the cloud and maintain your IT assets securely. Once you have completed this computer based training course, you will be fully capable of securing your own IT assets in the cloud.
Overview
Section 1: Introduction To Cloud Services
Lecture 1 Introduction And About The Author
Lecture 2 Service Models
Lecture 3 Service And Deployment Models
Lecture 4 Deployment Models Summary
Lecture 5 Deployment Models And Benefits
Lecture 6 Distributed Processing – The Reverse Cloud
Lecture 7 Building Internal Cloud Hardware
Lecture 8 Building Internal Cloud Software
Lecture 9 Using An External Cloud
Section 2: Securing The Infrastructure
Lecture 10 Introduction
Lecture 11 Framework
Lecture 12 Policy Samples
Lecture 13 Risk Management Introduction
Lecture 14 Risk Assessment
Lecture 15 Risk Management
Lecture 16 Security Program And CIA
Lecture 17 CIA
Lecture 18 Types Of Security
Lecture 19 Sensitive Data
Lecture 20 Data Classification
Lecture 21 AAA
Lecture 22 Bastion Host – Part 1
Lecture 23 Bastion Host – Part 2
Lecture 24 Configuration Control
Lecture 25 Security Training – Part 1
Lecture 26 Security Training – Part 2
Lecture 27 User Provisioning
Lecture 28 Monitoring And Incident Response
Lecture 29 Incident Response Process
Section 3: Preparing For Cloud Use
Lecture 30 Introduction And Framework For Governance
Lecture 31 Planning For Cloud Use
Lecture 32 Planning For Cloud Use – Readiness Tool
Lecture 33 Security Controls
Lecture 34 Enterprise Connect Zone
Lecture 35 Web App Security
Lecture 36 Security As A Service
Lecture 37 Security Controls Summary
Lecture 38 Due Diligence On The CSP
Section 4: The Cloud Services Agreement
Lecture 39 Required Services
Lecture 40 NDA, Access And Compliance
Lecture 41 Data Protection And Redundancy
Lecture 42 Data Fault Tolerance And Redundancy
Lecture 43 System Fault Tolerance And Redundancy
Lecture 44 Connectivity Fault Tolerance And Redundancy
Lecture 45 Notification And Penalties
Lecture 46 CSP Prudent Management
Lecture 47 Monitoring The CSP
Section 5: Staying Secure In The Cloud
Lecture 48 Cautious Implementation
Lecture 49 Inspections – Monitoring And Metrics
Lecture 50 Incident Response And Key Escrow
Lecture 51 Agreement Monitoring And Enforcement
Section 6: Wrap Up
Lecture 52 Course Review
IT and data professionals concerned with secure cloud migration and operation

Homepage

https://www.udemy.com/course/securing-cloud-services/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction