Security in the Cloud

This course will teach the different concepts and technologies that are needed to understand various security services for a virtual solution deployment.
Course info
Level
Beginner
Updated
Apr 26, 2018
Duration
1h 2m
Table of contents
Description
Course info
Level
Beginner
Updated
Apr 26, 2018
Duration
1h 2m
Description

This course focuses on security services for Cloud+ and virtual solutions. In this course, Security in the Cloud, you'll learn foundational knowledge about various security tools, services, and technologies of a virtualization/cloud solution deployment. First, you'll learn about security configurations and compliance. Next, you'll explore information about access control. Finally, you'll review the different security automation techniques and tools. When you're finished with this course, you will have the skills and knowledge of security technologies needed to understand security for Cloud+.

About the author
About the author

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

More from the author
Maintenance in the Cloud
Beginner
1h 15m
26 Apr 2018
More courses by Sean Wilkins
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight. My name is Sean Wilkins, and I am a network engineer, author, and technical editor at infoDispersion. I'm excited to welcome you to my course, Security in the Cloud. This course is one of many courses that are being introduced into the Pluralsight library to cover cloud topics. This course specifically focuses on security topics. In investigating cloud security configurations and compliance control, we look at different cloud security configuration topics including security policy, encryption technologies, key and certificate management, and tunneling protocols. In analyzing cloud security technologies and access control, we look at the different security technologies that are used to secure a cloud solution, including access control models, object authorization, data classification, as well as segmentation and microsegmentation. And finally, in reviewing cloud automation techniques, we take a look at the different techniques that can be used to automate the various tasks in the cloud, including associated tools and services. By the end of this course, you'll have a good base of knowledge to successfully understand the different security concepts and technologies that are commonly seen implemented on cloud and virtualization-based solutions. I hope you'll join me on this journey to learn about the cloud with the Security in the Cloud course at Pluralsight.

Analyzing Cloud Security Technologies and Access Control
Hello everyone, and welcome to Security for the Cloud. My name is Sean Wilkins, and this is the Analyzing Cloud Security Technologies and Access Control module. In this module, we will talk about a number of different security technologies that are used to secure a cloud solution, including a more detailed discussion of access control models and how they operate, as well as a discussion on object authorization in virtualization and cloud solutions. We then move on to a discussion of data classification and how it is used in modern systems, before moving into a final section on segmentation and microsegmentation. By the end of this module, you should have a better understanding of those topics and how they are used in modern environments. So now with all this out of the way, let's get started.

Reviewing Cloud Automation Techniques
Hello everyone, and welcome to Security for the Cloud. My name is Sean Wilkins, and this is the Reviewing Cloud Automation Techniques module. In this module, we will talk about a number of different security automated techniques and tools that are used by enterprises and their security engineers to help manage the more time-consuming repetitive tasks that can be performed via an automated process. We begin with a short section to define exactly what security automation is, and how it is used. Next we move on to cover the different common security automation techniques that are used within many enterprises. We then have a section reviewing the different security services that exist within most enterprises, and finish up with a section on some of the different security and automation tools that are used. By the end of this module you should have a good idea of how automation can be used to reduce the demands on the security engineers and let them focus on more highly skilled tasks. And now with all of this out of the way, let's get started.