From the course: CompTIA Cloud+ (CV0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Describe hardening and configuration changes
From the course: CompTIA Cloud+ (CV0-003) Cert Prep
Describe hardening and configuration changes
- When we deploy cloud-based resources, we got to make sure that they're secure through a process called hardening, and make sure that configurations happen the way we want. Stick around as that conversation is starting right now. - You're watching ITProTV. (graphic beeping) (graphic beeping) (graphic whooshing) - Hello, ladies and gentlemen. Thank you for tuning into more of the CompTIA Cloud+. That's right. In this episode, we're going to be talking about a concept that's very, very important. And if we're not careful when we deploy cloud resources, we could be setting ourselves up for things like security vulnerabilities, and that's a concept called hardening. Now, at this point, some of you in your career should be very, very, I would say, aware of what a hardening technique is, right? When we talk about physical resources. Well, it really isn't any different when we talk about deploying to the cloud. We can't just deploy and stand resources up and expect that they are secure…
Contents
-
-
-
(Locked)
Identify and discuss IAM15m 15s
-
(Locked)
Identify and discuss IAM demo15m 55s
-
(Locked)
Identify and configure security access controls17m 35s
-
(Locked)
Security access controls demo14m 6s
-
(Locked)
Analyze the IAM solutions20m 33s
-
(Locked)
Explain network segmentation in cloud security15m 5s
-
(Locked)
Network segmentation in cloud security demo7m 35s
-
(Locked)
Explain network services in cloud security20m 59s
-
(Locked)
Network services in cloud security demo16m 39s
-
(Locked)
Choose the protocol to secure cloud traffic21m 40s
-
(Locked)
Protocols to secure cloud traffic demo16m 6s
-
(Locked)
Describe hardening and configuration changes15m 32s
-
(Locked)
Hardening cloud-based resources demo13m 39s
-
(Locked)
Analyze the security solutions11m 31s
-
(Locked)
Identify different application security controls21m 8s
-
(Locked)
Identify different OS security controls17m
-
(Locked)
Analyze app and OS security control solutions9m 29s
-
(Locked)
Explain data security controls in the cloud20m 20s
-
(Locked)
Explain compliance controls in the cloud17m 42s
-
(Locked)
Data and compliance controls demo17m 59s
-
(Locked)
Analyze data and compliance controls7m 10s
-
(Locked)
Meet security requirements in the cloud21m 42s
-
(Locked)
Security requirements in the cloud demo14m 13s
-
(Locked)
Analyze security requirement solutions9m 35s
-
(Locked)
Review incident response procedure16m 50s
-
(Locked)
-
-
-