O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing Cloud Services

Video Description

In this Securing Cloud Services training course, expert author David Miller will teach you how to secure and maintain your IT assets in the cloud. This course is designed for the absolute beginner, meaning no experience with cloud services is required.
You will start by learning how to secure the infrastructure, including risk assessment and management, sensitive data, and data classification. From there, David will show you how to prepare for cloud use, including web app security, security as a service, and security controls. This video tutorial also teaches you about the cloud services agreement, and what you should consider including in your cloud services agreement. Finally, you will learn how to stay secure in the cloud and maintain your IT assets securely.
Once you have completed this computer based training course, you will be fully capable of securing your own IT assets in the cloud.

Table of Contents

  1. Introduction And About The Author 00:03:33
  2. Service Models 00:08:56
  3. Service And Deployment Models 00:08:42
  4. Deployment Models Summary 00:05:01
  5. Deployment Models And Benefits 00:10:48
  6. Distributed Processing - The Reverse Cloud 00:07:15
  7. Building Internal Cloud Hardware 00:08:36
  8. Building Internal Cloud Software 00:04:16
  9. Using An External Cloud 00:07:42
  10. Introduction 00:08:51
  11. Framework 00:08:03
  12. Policy Samples 00:09:07
  13. Risk Management Introduction 00:05:43
  14. Risk Assessment 00:06:51
  15. Risk Management 00:08:48
  16. Security Program And CIA 00:06:54
  17. CIA 00:14:41
  18. Types Of Security 00:09:41
  19. Sensitive Data 00:09:01
  20. Data Classification 00:06:31
  21. AAA 00:08:15
  22. Bastion Host - Part 1 00:06:49
  23. Bastion Host - Part 2 00:08:27
  24. Configuration Control 00:05:03
  25. Security Training - Part 1 00:07:37
  26. Security Training - Part 2 00:08:18
  27. User Provisioning 00:10:46
  28. Monitoring And Incident Response 00:06:51
  29. Incident Response Process 00:06:46
  30. Introduction And Framework For Governance 00:08:33
  31. Planning For Cloud Use 00:08:08
  32. Planning For Cloud Use - Readiness Tool 00:11:49
  33. Security Controls 00:11:53
  34. Enterprise Connect Zone 00:06:58
  35. Web App Security 00:11:38
  36. Security As A Service 00:07:00
  37. Security Controls Summary 00:08:06
  38. Due Diligence On The CSP 00:06:37
  39. Required Services 00:09:04
  40. NDA, Access And Compliance 00:06:08
  41. Data Protection And Redundancy 00:07:25
  42. Data Fault Tolerance And Redundancy 00:06:06
  43. System Fault Tolerance And Redundancy 00:06:55
  44. Connectivity Fault Tolerance And Redundancy 00:08:14
  45. Notification And Penalties 00:06:43
  46. CSP Prudent Management 00:06:39
  47. Monitoring The CSP 00:04:34
  48. Cautious Implementation 00:06:43
  49. Inspections - Monitoring And Metrics 00:07:25
  50. Incident Response And Key Escrow 00:05:16
  51. Agreement Monitoring And Enforcement 00:05:58
  52. Course Review 00:04:26