Description:

Azure, AWS, and Google Cloud Platform provide various security services to secure access, applications, data, infrastructures, and deployments in the cloud. In this course, you'll explore the security services provided by AWS Cloud Security for securing workloads and applications, as well as the Azure security products that can be used to protect data, applications, and infrastructures. You'll explore the Google Security Model, the security services provided by Google, why you need to secure containers, and recommended cloud container security best practices for securing container usage in the cloud. You'll move on to learn about how configure AWS Security Hub, create and configure symmetric and asymmetric keys using AWS KMS, and implement Azure Active Directory and Seamless Single Sign-On. Finally, you'll examine how to set up VPN between a Check Point Security Gateway and Cloud VPN on Google Cloud Platform, harden security and restrict network access to the control plane and nodes of Google Kubernetes Engine, and how to encrypt Kubernetes secrets at the application layer.

Target Audience:

Duration: 00:56

Description:

Securing multi-cloud deployments and CloudOps platforms involves managing the security and privacy of your cloud services. In this course, you'll explore the key principles and strategies for securing the enterprise cloud, recommended practices and models for perimeter security, and how to choose appropriate security mechanisms. You'll examine the configurable options for security mechanisms on both service and client side, the prominent intrusion detection techniques for managing cloud computing and security challenges, and prominent cloud audit methods. Next, you'll learn approaches for overcoming the impacts of security challenges in multi-cloud environments, best practices for improving the security of multi-cloud deployments, and how to secure CloudOps platforms to build secure pipelines, middleware, and infrastructure for multi-cloud applications. Finally, you'll explore issues a cloud architect should consider when designing cloud solutions and cloud service consumers should evaluate and manage the security and privacy of cloud services.

Target Audience:

Duration: 01:09