CCSP®: Cloud Infrastructure Security

Do you know the top risks to cloud computing? When you take this course, not only will you be able to easily identify them, but you will also understand how to mitigate them to an acceptable level for your business to consume services securely.
Course info
Level
Intermediate
Updated
Feb 19, 2020
Duration
1h 31m
Table of contents
Description
Course info
Level
Intermediate
Updated
Feb 19, 2020
Duration
1h 31m
Description

Cloud computing can potentially increase the attack surface for the malicious and misguided. In this course, CCSP®: Cloud Infrastructure Security, you will identify top threats to cloud computing as defined by global leaders in the security industry. First, you will learn how to analyze risks related to cloud infrastructure with a view to applying the proper security controls to mitigate them.
Next, you will discover how to implement cloud interoperability and portability techniques in selecting and integrating cloud services between providers and on-premises environments to cloud environments. Finally, you will explore planning, designing, implementing, and testing cloud BCDR strategies. When you are finished with this course, you will have the skills necessary to protect your cloud infrastructure.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
CCSP®: Cloud Risk and Compliance
Intermediate
1h 3m
Apr 9, 2020
CCSP®: Cloud Security Operations Controls
Intermediate
1h 16m
Mar 18, 2020
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Greetings. My name is Lie, Ron, and welcome to my core CCS P Cloud infrastructure security. I am a cloud security consultant Authorized Icy Square trainer and author of multiple official I S C squared student guides. Did you know that chaos engineering can provide the foundation for a resilient cloud infrastructure with better efficacy than parallel or even full test? As with all technologies and service, is that streamlined complexity and make service is more readily consumable. So, too, does it increase the attack surface for the militias and misguided. These risk can be analyzed from the standpoint of as a service or can be perceived through the generic lens of top threats to cloud computing as defined by global leaders in the security industry. In this course, we're going to be analyzing risk related to cloud infrastructure with the View toe applying the proper security controls to mitigate them, we will be incorporating cloud interoperability and portability techniques, and selecting and integrating cloud service is between providers and between on premises, environment to cloud environments. We won't finally be enumerating the process of planning, designing and implementing through test a business continuity management system by the end of this course, you will have the basic skills needed to identify and mitigate the top risk to cloud computing. Prepare for integrated service is between multiple cloud providers and define a business driven B C d r strategy in the cloud. I hope you'll join me on this journey toe. Learn how to provide cloud infrastructure security in the C. C S P cloud infrastructure security course at plural site.