Secure Cloud Applications, Users, and Related Technologies

The distributed nature of the cloud presents a challenge for protecting assets. This course will teach you the frameworks for securing cloud applications, users, and other assets.
Course info
Level
Intermediate
Updated
Aug 6, 2020
Duration
1h 5m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 6, 2020
Duration
1h 5m
Description

In the next year and beyond, many companies plan to move almost all of their applications to the cloud, while some larger corporations have already moved one hundred percent of their applications to the cloud! Protecting valuable assets within the distributed nature of the cloud then presents a challenge. In this course, Secure Cloud Applications, Users, and Related Technologies, you’ll learn to apply frameworks for securing cloud applications, users, and other assets. First, you’ll explore application security in the cloud. Next, you’ll discover how to employ IAM tools to manage least privilege access for users. Finally, you’ll learn how to categorize and protect related technologies. When you’re finished with this course, you’ll have the skills and knowledge of Secure Cloud Applications, Users, and Related Technologies needed to protect your distributed cloud assets.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
Perform Cloud Security Operations
Intermediate
48m
Aug 11, 2020
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Lyron and welcome to my course, Secure Cloud Applications, Users and Related Technologies. I am an international cloud security consultant, author and trainer at Profabula LLC. O'Reilly Learning did a survey in 2020 and found that 25% of their respondents said that their companies plan to move all of their applications to a cloud context in the next year. This includes 17% of respondents from large organizations over 10,000 employees that have already moved 100% of their applications to the cloud. In this course, we're going to learn how to protect your distributed cloud assets. First, we'll explore application security in the cloud. Next, you will discover how to employ IAM tools to manage least privilege access for users. Finally, you'll learn how to categorize and protect related technologies. By the end of this course, you'll have the skills and knowledge of secure cloud applications, users and related technologies needed to protect your distributed cloud assets. Before beginning this course, you should be familiar with the Introduction to Information Security within Cloud Computing. I hope you'll join me on this journey to learn to protect your distributed cloud assets with the Secure Cloud Applications, Users and Related Technology course at Pluralsight.