Cloud Platorm Security offers a new level of confidence for security and protection while using cloud services. In this course, CCSP: Cloud Platform Security, you will learn the steps to take to be better prepared to protect your organization's cloud platforms. First, you will look at how to enumerate the primary services of the cloud that will aid you in selection, advising, and managing your cloud environments. Next, you will discover what identity access management tools and protocols should be used given a business requirement. Finally, you will discover how to devise and execute on a list of controls that will aid you in protecting access to your services. By the end of this course, you will be better prepared to protect your cloud platform.
Course Overview [Autogenerated] Hi, everyone. My name is lie, Ron, and welcome to my course CCS p Cloud platform security. I am a cloud security consultant authorized I S C Square trainer and author of multiple official I S C squared student guides. Did you know that most virtual private clouds, or VP sees are typically configured within public clouds, while a V P. C is a major form of security related to access from the Internet to your cloud service is and systems. There are several other controls necessary to form the cloud security ecosystem. Some of the major topics that we will cover include utilizing cloud components that provide secure service's from the perspective of a C S. P. While many of these elements may be unseen from the consumers view, it is important to understand what they are. In order to manage risk with greater accuracy, we will look at understanding the Federated identity and entitlement purpose and process by closely examining open I d. Connect Go Off and Samel. This will include comparing and contrasting there specifications, use and process flow. We will also look at implementing cloud controls that include protecting your management, consul access through screening and isolating access to cloud instances and service is with VPC security groups and multi factor authentication. By the end of this course, you will know how to enumerate the primary service is of the cloud that will aid you in selection, advising and managing your cloud environment. You will know what identity access management told protocol should be used. Given a business requirement, you will be able to devise and execute on a list of controls that will aid you in protecting access to your service is before beginning this course. You should be familiar with E. C. C S P Introduction to cloud security Course. I hope you will join me on this journey to learn the important elements of cloud platform security with the C. C S P Cloud platform security course at Laurel site.