Cybersecurity with Cloud Computing

Cybersecurity with Cloud Computing

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 27m | 346 MB

More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.

Topics include:

  • Cloud services overview
  • Deployment models
  • Microsoft Azure
  • Amazon Web Services
  • Google Apps
  • Cloud security risks and failures
  • Identifying unauthorized access
  • Managing cloud security
  • Cloud security capabilities
  • Security as a service (SecaaS)
Table of Contents

Introduction
1 Making your cloud deployments secure
2 What you should know

Cloud Foundations
3 Cloud security guidance
4 Essential characteristics
5 Cloud services
6 Infrastructure as a service
7 Platform as a service
8 Software as a service
9 Deployment models
10 Hypervisors and visualization

Looking at the Clouds
11 Microsoft Azure
12 Command-line access to Azure
13 Amazon Web Services
14 Command-line access to Amazon
15 Google Apps
16 Security as a service
17 Cloud provider SECaaS
18 An insight into Rapid7s SECaaS

Cloud Flaws Incidents. and Failures
19 Incidents in the cloud
20 Anatomy of a service failure
21 Anatomy of a business failure
22 Incident response
23 Azure recommendations on incident management
24 Cloud resilience

Hands-On with Cloud Flaws
25 Unauthorised access to buckets by anyone
26 Unauthorized account access to buckets
27 Searching for account keys

Cloud Security Management
28 Architecting governance and risk
29 Legal compliance and audit
30 Information governance
31 Application security
32 Deploying and operating applications

Cloud Security Capabilities
33 Cryptography foundations
34 Data security and encryption
35 Identity in the cloud
36 Controlling access to cloud objects
37 Setting up access control in AWS
38 Logging and monitoring in the cloud
39 VM monitoring with Azure

Whats Next
40 Next steps