Search result for Cloud security Online Courses & Certifications
Get Course Alerts by Email
Managing Security in Google Cloud
by Google Cloud Training- 4.7
Approx. 7 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Welcome to Managing Security in Google Cloud Foundations of Google Cloud Security Threats Mitigated by Google and Google Cloud Foundations of Google Cloud Security Cloud Identity Cloud Identity Overview Managing Google Cloud Permissions and Groups...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Describe the process for configuring cloud security Operate and Configure Cloud Security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. Welcome to Cloud Security Basics An overview of Cloud Security Basics Step 6 and Cloud Security Cloud Architecture and Security Planning Notes on Constructing a Basic Cloud Security Plan...
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Best practices for managing Google Cloud costs Financial Governance in the Cloud Module 2: Security in the Cloud Today’s top cyber security challenges Security in the cloud...
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
It is designed to help you understand how these products work, how they should be used, and help you gain the required knowledge to prepare for the ACA/ACP level cloud security specialist. Cloud Platform Security Overview: https://edu. Alibaba Cloud Security Products Overview Security Challenge to Hosts in Cloud Cloud Application Security Overview...
Alibaba Cloud Native Solutions and Container Service
by Steve Xue- 0.0
Approx. 11 hours to complete
Alibaba Cloud is now offering a free certification on the newest generation of our Elastic Compute Service. This course demonstrates how to use Alibaba Cloud Container Service and Container Registry Service to design and develop architectures related to cloud native applications, services, and security solutions. Alibaba Cloud and CNCF Cloud Native Open Class: https://edu....
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Mobile security and cloud security hyper-resilience approaches are also introduced. Hybrid Cloud Security Cloud Access Security Brokers Advanced Hybrid Cloud Security Architecture (Part 1) Advanced Hybrid Cloud Security Architecture (Part 2) Advanced Hybrid Cloud Security Architecture (Part 3)...
Related searches
Cyber Threats and Attack Vectors
by Greg Williams- 4.7
Approx. 12 hours to complete
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY Cloud Security Database Security Real Cloud Based Attacks Cloud Security Alliance Week 3: Cloud Security...
Cloud Application Security
by Rick Smith- 0.0
Approx. 6 hours to complete
● Identify methods to provide cloud security assurance as part of the development life cycle, e. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed. Top Ten Cloud Security Risks Welcome to Cloud Application Security (place holder)...
Network Security
by Wenke Lee , Catherine Gamboa- 0.0
Approx. 16 weeks
lesson 1 Large-Scale Attacks DDoS Attacks Malware-Based Attacks Phishing & Fraud Underground infrastructures lesson 2 Testing and Security Assessments Penetration Testing Social Engineering and Human Factors Web Security Models & Security and Internet Protocols lesson 3 Advanced Topics Evasive and Mobile Malware Botnet detection & Cloud Security Attack-Tolerant Systems...
Free