PLU | CCSP: Cloud Platform Security (2020 EN)

Discussion in 'Information Technology' started by Kanka, Apr 12, 2020.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Lyron Andrews
    Full Title: CCSP: Cloud Platform Security
    Year: 2020
    Language: English
    Genre: Educational: Cloud Computing
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 00:58:00
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz



    Cloud Platform Security includes the essential elements of protection when consuming cloud services. Learn what these elements are, when to use them, and what they accomplish for your organization.

    Cloud Platorm Security offers a new level of confidence for security and protection while using cloud services. In this course, CCSP: Cloud Platform Security, you will learn the steps to take to be better prepared to protect your organization's cloud platforms. First, you will look at how to enumerate the primary services of the cloud that will aid you in selection, advising, and managing your cloud environments. Next, you will discover what identity access management tools and protocols should be used given a business requirement. Finally, you will discover how to devise and execute on a list of controls that will aid you in protecting access to your services. By the end of this course, you will be better prepared to protect your cloud platform.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Using Cloud Components that Provide Service
    02. Utilizing Cloud Service Components
    03. Understanding Cloud Compute Options
    04. Examining Cloud Storage Options
    05. Reviewing Virtualized Network Services
    06. Understanding the Cloud Management Plane
    07. Summary
    3. Designing Cloud IAM Controls
    08. Designing IAM Controls
    09. Understanding Federated Identities and Entitlement
    10. Selecting Federated Protocols
    11. Evaluating CASBs and IDaaS
    12. Summary
    4. Implementing Cloud Security Controls
    13. Implementing Cloud Security Controls
    14. Virtual Private Cloud
    15. Security Groups
    16. Trusted Platform Module
    17. Summary


    -------------