From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Summary and next steps
From the course: Cloud Data, Platform, and Applications Security by Pearson
Summary and next steps
“
I really appreciate you taking the time to complete this Cloud Data Platform and Application Security video course. I hope you gained valuable insights and feel more confident in securing cloud environments. I'm wishing you all the best in your cloud security journey and future endeavors. Take care.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Watch this course anytime, anywhere.
Get started with a free trial today.
Contents
-
-
(Locked)
Learning objectives29s
-
(Locked)
Concepts of cloud data security6m 12s
-
(Locked)
Data obfuscation4m 4s
-
(Locked)
Information rights management3m 10s
-
(Locked)
Keys, secrets, and certificate management3m 17s
-
(Locked)
Data discovery4m 22s
-
(Locked)
Data classification and policy5m 22s
-
(Locked)
Auditability, traceability, and accountability4m 43s
-
(Locked)
-
-
(Locked)
Module introduction1m 17s
-
(Locked)
Learning objectives31s
-
(Locked)
Physical cloud environments3m 41s
-
(Locked)
Network cloud environments15m 35s
-
(Locked)
Cloud communications3m 25s
-
(Locked)
Core cloud compute resources5m 38s
-
(Locked)
Cloud virtualization resources3m 59s
-
(Locked)
Core cloud storage components3m 48s
-
(Locked)
Management plane cloud solutions7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives25s
-
(Locked)
Secure data center logical design10m 42s
-
(Locked)
Physical data center design9m 52s
-
(Locked)
Data center environmental design8m 29s
-
(Locked)
Design resilient environments6m 20s
-
(Locked)
Cloud infrastructure risk assessment14m 30s
-
(Locked)
Cloud vulnerabilities, threats, and attacks3m 30s
-
(Locked)
Cloud infrastructure risk mitigation strategies16m 43s
-
(Locked)
-
-
(Locked)
Module introduction1m 25s
-
(Locked)
Learning objectives32s
-
(Locked)
Cloud application architecture elements10m 1s
-
(Locked)
Cloud development6m 9s
-
(Locked)
SDLC business requirements and phases8m 56s
-
(Locked)
Common software vulnerabilities5m 55s
-
(Locked)
Software threat modeling methods8m 53s
-
(Locked)
Secure coding methodologies5m 48s
-
(Locked)
Software configuration management and versioning4m 46s
-
(Locked)
-
-
(Locked)
Learning objectives35s
-
(Locked)
Cloud IAM services7m 32s
-
(Locked)
Federated identity2m 16s
-
(Locked)
Identity providers5m 29s
-
(Locked)
Single sign-on5m 33s
-
(Locked)
Multifactor authentication57s
-
(Locked)
Cloud access security brokers2m
-
(Locked)
Managed security service providers2m 33s
-
(Locked)
Secrets management2m 4s
-
(Locked)