Inhalt: Many types of resources, including virtual machines, databases, and storage, can be deployed in a cloud computing environment. This course teaches you the skills necessary to design and deploy cloud solutions that meet business needs, through cloud-related concepts discussions and hands-on cloud service deployments. This course maps to the first domain in the CSA Certificate of Cloud Security Knowledge (CCSK) exam: Cloud Computing Concepts and Architecture. First, instructor Daniel Lachance defines cloud computing as IT services running on a provider equipment over a network. He clarifies several terms and concepts used in cloud computing. Next, Daniel examines the characteristics of cloud computing, including several NIST cloud computing characteristics. He explores a variety of cloud types that can be used for cloud computing delivery, depending on organizational requirements. In conclusion, Daniel makes sure you know how to define and deploy several cloud computing service models. Umfang: 01:14:29
Inhalt: Cloud-based services should be secured with common practices such as hardening, disaster recovery planning, periodic security testing, and the use of encryption. Instructor Daniel Lachance goes over software-defined networking (SDN), cloud network infrastructure security, cloud application workload security, and business continuity in the cloud. Daniel begins with an overview of SDN and shows you how to create a virtual private cloud (VPC). He explains how to configure VPC peering, which links cloud-based networks. Daniel describes how to manage access control lists (ACLs) and how to configure a virtual private network (VPN). He reviews ways to manage cloud resources remotely over the Internet. Daniel explains identity and access management (IAM) policies. He discusses how to conduct a business impact analysis and craft disaster recovery policies, then concludes with an explanation of cloud backups and how you can use them to protect workloads and data on-premises. Umfang: 01:41:02
Inhalt: Outsourcing IT services to public cloud providers introduces and changes IT-related risks to an organization. Instructor Daniel Lachance goes over risk management, compliance, and security monitoring in the cloud. Daniel shows you how to identify assets such as virtual machines, cloud storage, and web apps, then goes over ways to manage the risks associated with the assets, including the Cloud Controls Matrix (CCM), Consensus Assessments Initiative Questionnaire (CAIQ), and the Security Trust Assurance and Risk (STAR) registry. He explains that data privacy is a primary concern for all businesses, so compliance with all applicable regulations and standards for securing data is key. Daniel covers how you can monitor cloud security using cloud service logs, cloud auditing, alerts, notifications, and more. Umfang: 01:30:06
Inhalt: Data privacy is vitally important, and with the growth of cloud adoption and reported data breaches, organizations must take careful steps to protect sensitive data. In this course, instructor Daniel Lachance helps you prepare for the data security portion of the CCSK exam and build your understanding of data privacy and protection. Daniel begins with the data security lifecycle, showing you how it applies both on-premises and in the cloud. He explains cloud storage solutions, cloud encryption solutions, and the Cloud Controls Matrix (CCM). Next, Daniel goes over tools and techniques to help you keep your cloud storage secure. He discusses ways that cloud databases can support secure cloud solutions and ways that you can keep your cloud databases secure. Daniel concludes with useful details on encryption keys, including how to deploy a Microsoft Azure key vault, how to encrypt managed disks, and how to protect data transfers with SSH public key authentication. Umfang: 01:49:03
Inhalt: Developing and managing cloud-based applications requires that security be considered in all DevOps activities. In this course, instructor Daniel Lachance teaches you about application security in the cloud and helps you prepare for the portion of the CCSK exam devoted to application security and identity management for cloud computing. Daniel begins with ways you can use identity and access management, identity federation, Amazon Web Services IAM groups, multifactor authentication (MFA), and more to manage what data is available online and how it can be accessed. He explains several facets of developing software in the cloud, then concludes with a thorough discussion of container cloud solutions, such as application containers, Azure container registries, and application load balancing. Umfang: 01:18:12
Inhalt: Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more. Umfang: 01:47:49.00
Inhalt: Secure Sockets Layer (SSL) and the succeeding Transport Layer Security (TLS) provide the backbone of securing intranet and internet network communications through encryption and authentication. SSL and TLS standards are widely used to secure network communications for services such as websites, VoIP, VPNs, and email messages. In this course, learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates. Instructor Daniel Lachance dives into how to install and configure PKI solutions in both Windows and Linux. Learn about how certificates are issued and managed throughout their lifetime; how hashing provides integrity and digital signatures provide authentication; and more. Umfang: 02:24:19.00
Inhalt: Microsoft System Center Endpoint Protection provides a centralized method of deploying and monitoring the security of managed devices with alert and report capabilities. In this course, discover how to leverage System Center Endpoint Protection to minimize malware incidents in the enterprise. Daniel Lachance begins the course by defining malware types, and explaining how to get Endpoint Protection up and running with System Center Configuration Manager. Next, he dives into creating antimalware policies and planning an update strategy. To wrap up, he covers monitoring, explaining how alerts and reports can be used to monitor the security health of devices. Umfang: 01:55:31.00
Inhalt: System Center 2016 Service Manager (SM) offers an integrated platform that can help IT administrators and help desk technicians implement, track, and support IT service requests and enterprise incident and problem management. SM provides a centralized repository of corporate IT asset information such as users and computers. With SM, you can configure how incidents, problems, and change requests are handled. In addition, the customizable Self-Service Portal allows IT service request submission and IT resource provisioning by the end user. In this course, Daniel Lachance covers how to implement, customize, and manage an SM ecosystem. Explore the benefits of SM, how to install the SM management and data warehouse servers, and how to configure key settings. In addition, learn how to publish a service offering to the Self-Service Portal, create incidents, problems, and change requests, and more. Umfang: 02:01:23.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 09.05.2024, 13:27 Uhr. 964 Zugriffe im Mai 2024. Insgesamt 511.194 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral