Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Overview
Syllabus
Introduction
- Making your cloud deployments secure
- What you should know
- Cloud security guidance
- Essential characteristics
- Cloud services
- Infrastructure as a service
- Platform as a service
- Software as a service
- Deployment models
- Hypervisors and visualization
- Microsoft Azure
- Command-line access to Azure
- Amazon Web Services
- Command-line access to Amazon
- Google Apps
- Security as a service
- Cloud provider SECaaS
- An insight into Rapid7's SECaaS
- Incidents in the cloud
- Anatomy of a service failure
- Anatomy of a business failure
- Incident response
- Azure recommendations on incident management
- Cloud resilience
- Unauthorised access to buckets by anyone
- Unauthorized account access to buckets
- Searching for account keys
- Architecting governance and risk
- Legal, compliance, and audit
- Information governance
- Application security
- Deploying and operating applications
- Cryptography foundations
- Data security and encryption
- Identity in the cloud
- Controlling access to cloud objects
- Setting up access control in AWS
- Logging and monitoring in the cloud
- VM monitoring with Azure
- Next steps
Taught by
Malcolm Shore