From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Network security
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Network security
- [Instructor] Welcome back to this lesson on network security. In this lesson, we're first going to talk about some network security challenges and then we'll talk about a few tools that might help solve some of those challenges. And then we're also going to talk about some networking-related concepts, such as zero trust architecture, as well as traffic inspection, geofencing, and monitoring. Some of the most common network security challenges we're going to face within a cloud environment takes us back to those five key features of what makes cloud computing cloud computing according to NIST. One of those is broad network access, and if you remember, that's essentially the concept that cloud systems should be widely accessible to a customer using a variety of different protocols, which can be beneficial, but that also creates some additional risk in how we control that broad network access and can certainly lead to some exposure of those resources. More along that same concept, in…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-