he Cybersecurity with Cloud Computing course provides a comprehensive and in-depth understanding of the key principles and practices of securing cloud environments. It covers critical topics such as encryption, network security, identity management, and compliance frameworks, all tailored to cloud platforms.
The course materials are well-structured and cater to both beginners and those with more experience in cloud security. The practical applications of the concepts, such as securing cloud infrastructure, identifying potential vulnerabilities, and managing risk in a cloud-based environment, were particularly valuable.
One of the standout features of the course was the focus on real-world use cases and hands-on labs, which allowed me to apply theoretical knowledge to actual scenarios. The instructors were knowledgeable, providing clear explanations of complex topics, and they were responsive to questions and concerns.
Overall, I would highly recommend this course to anyone looking t
Cybersecurity with Cloud Computing
With Malcolm Shore
Liked by 4,543 users
Duration: 2h 35m
Skill level: Intermediate
Released: 7/23/2020
Course details
More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
-
-
-
Shandukani Vhulondo Pr Eng, MSAIEE
Shandukani Vhulondo Pr Eng, MSAIEE
Senior Research & Innovation Engineer | Digitalisation Transformation| AI in Cybersecurity | Leading Researcher on AI & Machine Learning, Robotic…
Contents
What’s included
- Practice while you learn 1 exercise file
- Test your knowledge 6 quizzes
- Learn on the go Access on tablet and phone
- Stay up to date Continuing Education Units