Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Securing the Cloud
Securing the Cloud
Curriculum
6 Sections
34 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: Clouds Aren’t Bulletproof
12
1.1
Knowing Your Business
1.1
Quiz for Knowing Your Business
6 Questions
1.2
Knowing Your SLA Agreements with Service Providers
1.2
Quiz for Knowing Your SLA Agreements with Service Providers
5 Questions
1.3
Building Your Team
1.3
Quiz for Building Your Team
5 Questions
1.4
Creating a Risk Management Plan
1.4
Quiz for Creating a Risk Management Plan
7 Questions
1.5
When Security Is Your Responsibility
1.5
Quiz for When Security Is Your Responsibility
7 Questions
1.6
Avoiding Security Work with the Help of the Cloud
1.6
Quiz for Avoiding Security Work with the Help of the Cloud
5 Questions
Chapter 2: Getting Down to Business
12
2.1
Negotiating the Shared Responsibility Model
2.1
Quiz for Negotiating the Shared Responsibility Model
5 Questions
2.2
SaaS, PaaS, IaaS, AaaA!
2.2
Quiz for SaaS, PaaS, IaaS, AaaA!
7 Questions
2.3
Managing Your Environment
2.3
Quiz for Managing Your Environment
6 Questions
2.4
Managing Security for Devices Not Under Your Control
2.4
Quiz for Managing Security for Devices Not Under Your Control
6 Questions
2.5
Applying Security Patches
2.5
Quiz for Applying Security Patches
5 Questions
2.6
Looking Ahead
2.6
Quiz for Looking Ahead
5 Questions
Chapter 3: Developing Secure Software
14
3.1
Turbocharging Development
3.1
Quiz for Turbocharging Development
6 Questions
3.2
Automating Testing during Development
3.2
Quiz for Automating Testing during Development
6 Questions
3.3
Running Your Applications
3.3
Quiz for Running Your Applications
6 Questions
3.4
Like DevOps but for Data
3.4
Quiz for Like DevOps but for Data
7 Questions
3.5
DevSecOps for DataOps
3.5
Quiz for DevSecOps for DataOps
5 Questions
3.6
Meeting the Challenges of DataSecOps
3.6
Quiz for Meeting the Challenges of DataSecOps
6 Questions
3.7
Understanding That No Cloud Is Perfect
3.7
Quiz for Understanding That No Cloud Is Perfect
5 Questions
Chapter 4: Restricting Access
14
4.1
Determining the Level of Access Required
4.1
Quiz for Determining the Level of Access Required
6 Questions
4.2
Understanding Least Privilege Policy
4.2
Quiz for Understanding Least Privilege Policy
6 Questions
4.3
Implementing Authentication
4.3
Quiz for Implementing Authentication
6 Questions
4.4
Introducing the Alphabet Soup of Compliance
4.4
Quiz for Introducing the Alphabet Soup of Compliance
6 Questions
4.5
Maintaining Compliance and CSPM
4.5
Quiz for Maintaining Compliance and CSPM
6 Questions
4.6
Controlling Access to the Cloud
4.6
Quiz for Controlling Access to the Cloud
8 Questions
4.7
Getting Certified
4.7
Quiz for Getting Certified
6 Questions
Chapter 5: Implementing Zero Trust
6
5.1
Making the Shift from Perimeter Security
5.1
Quiz for Making the Shift from Perimeter Security
5 Questions
5.2
Examining the Foundations of Zero Trust Philosophy
5.2
Quiz for Examining the Foundations of Zero Trust Philosophy
7 Questions
5.3
Dealing with Zero Trust Challenges
5.3
Quiz for Dealing with Zero Trust Challenges
6 Questions
Chapter 6: Using Cloud Security Services
10
6.1
Customizing Your Data Protection
6.1
Quiz for Customizing Your Data Protection
5 Questions
6.2
Validating Your Cloud
6.2
Quiz for Validating Your Cloud
7 Questions
6.3
HSM: Hardware Security Modules for the Big Kids
6.3
Quiz for HSM: Hardware Security Modules for the Big Kids
6 Questions
6.4
KMS: Key Management Services for Everyone Else
6.4
Quiz for KMS: Key Management Services for Everyone Else
7 Questions
6.5
Setting Up Crypto Service Gateways
6.5
Quiz for Setting Up Crypto Service Gateways
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content