From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Remote access
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Remote access
- [Instructor] We'll over this lesson on remote access. In this lesson, we'll first talk about some access methods, and then we'll follow it up with a discussion on access controls. To get started, you may be familiar with some of these concepts, but just in case you're not, we will go over them to make sure that everybody's on the same page. When accessing many types of resources, including cloud resources, especially remotely, it's imperative to use secure protocols. Starting with SSH, it's a standard for secure remote access, and this is often through a command light interface or CLI, and it ensures secure data transmission and user authentication. While SSH was originally built for the Linux operating system and other operating systems, including Windows now provide native support for SSH. RDP or Remote Desktop Protocol is another widely used method initially for Windows, but it now also supports various platforms and it ensures encrypted data transmission and robust user…
Contents
-
-
-
-
-
-
-
(Locked)
Domain 5 overview1m 57s
-
(Locked)
Hardware security4m 51s
-
(Locked)
Virtualization management, security, and tool sets5m 17s
-
(Locked)
Remote access4m 41s
-
(Locked)
Secure network configurations and controls12m 30s
-
(Locked)
Operating system hardening and configuration6m 46s
-
(Locked)
Availability of hosts and guest operating systems9m 14s
-
Performance, capacity, and hardware monitoring6m 27s
-
(Locked)
Infrastructure as code and the management plane6m 3s
-
(Locked)
Program management, part 18m 41s
-
(Locked)
Program management, part 28m 16s
-
(Locked)
Program management, part 37m 8s
-
(Locked)
Program management, part 46m 27s
-
(Locked)
Forensics, evidence collection, and preservation12m 16s
-
(Locked)
Communication and cloud stakeholders6m 57s
-
(Locked)
Security operations and intelligent monitoring6m 22s
-
(Locked)
Logging, incident management, and vulnerability assessments13m 18s
-
(Locked)
-