Cloud Platorm Security offers a new level of confidence for security and protection while using cloud services. In this course, CCSP: Cloud Platform Security, you will learn the steps to take to be better prepared to protect your organization's cloud platforms. First, you will look at how to enumerate the primary services of the cloud that will aid you in selection, advising, and managing your cloud environments. Next, you will discover what identity access management tools and protocols should be used given a business requirement. Finally, you will discover how to devise and execute on a list of controls that will aid you in protecting access to your services. By the end of this course, you will be better prepared to protect your cloud platform.
Course Overview Hi everyone. My name is Lyron, and welcome to my course, CCSP: Cloud Platform Security. I am a cloud security consultant, authorized (ISC)2 trainer, and author of multiple official (ISC)2 student guides. Did you know that most virtual private clouds, or VPCs, are typically configured within public clouds? While a VPC is a major form of security related to access from the internet to your cloud services and systems, there are several other controls necessary to form the cloud security ecosystem. Some of the major topics that we will cover include utilizing cloud components that provide secure services from the perspective of a CSP. While many of these elements may be unseen from the consumer's view, it is important to understand what they are in order to manage risk with greater accuracy. We will look at understanding the federated identity and entitlement purpose and process by closely examining OpenID Connect, OAuth, and SAML. This will include comparing and contrasting their specification, use, and process flow. We will also look at implementing cloud controls that include protecting your management console access through screening and isolating access to cloud instances and services with VPC, security groups, and multi‑factor authentication. By the end of this course, you will know how to enumerate the primary services of the cloud that will aid you in selection, advising, and managing your cloud environment. You will know what identity access management tools and protocols should be used given a business requirement. You will be able to devise and execute on a list of controls that will aid you in protecting access to your services. Before beginning this course, you should be familiar with the CCSP: Introduction to Cloud Security course. I hope you will join me on this journey to learn the important elements of cloud platform security with the CCSP: Cloud Platform Security course, at Pluralsight.