Skip to content
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
Course Catalog
About
Contact Us
Home
All Programs
Cybersecurity
Securing the Cloud
Securing the Cloud
Curriculum
6 Sections
34 Lessons
10 Weeks
Expand all sections
Collapse all sections
Chapter 1: Clouds Aren’t Bulletproof
12
1.1
Knowing Your Business
1.2
Quiz for Knowing Your Business
6 Questions
1.3
Knowing Your SLA Agreements with Service Providers
1.4
Quiz for Knowing Your SLA Agreements with Service Providers
5 Questions
1.5
Building Your Team
1.6
Quiz for Building Your Team
5 Questions
1.7
Creating a Risk Management Plan
1.8
Quiz for Creating a Risk Management Plan
7 Questions
1.9
When Security Is Your Responsibility
1.10
Quiz for When Security Is Your Responsibility
7 Questions
1.11
Avoiding Security Work with the Help of the Cloud
1.12
Quiz for Avoiding Security Work with the Help of the Cloud
5 Questions
Chapter 2: Getting Down to Business
12
2.1
Negotiating the Shared Responsibility Model
2.2
Quiz for Negotiating the Shared Responsibility Model
5 Questions
2.3
SaaS, PaaS, IaaS, AaaA!
2.4
Quiz for SaaS, PaaS, IaaS, AaaA!
7 Questions
2.5
Managing Your Environment
2.6
Quiz for Managing Your Environment
6 Questions
2.7
Managing Security for Devices Not Under Your Control
2.8
Quiz for Managing Security for Devices Not Under Your Control
6 Questions
2.9
Applying Security Patches
2.10
Quiz for Applying Security Patches
5 Questions
2.11
Looking Ahead
2.12
Quiz for Looking Ahead
5 Questions
Chapter 3: Developing Secure Software
14
3.1
Turbocharging Development
3.2
Quiz for Turbocharging Development
6 Questions
3.3
Automating Testing during Development
3.4
Quiz for Automating Testing during Development
6 Questions
3.5
Running Your Applications
3.6
Quiz for Running Your Applications
6 Questions
3.7
Like DevOps but for Data
3.8
Quiz for Like DevOps but for Data
7 Questions
3.9
DevSecOps for DataOps
3.10
Quiz for DevSecOps for DataOps
5 Questions
3.11
Meeting the Challenges of DataSecOps
3.12
Quiz for Meeting the Challenges of DataSecOps
6 Questions
3.13
Understanding That No Cloud Is Perfect
3.14
Quiz for Understanding That No Cloud Is Perfect
5 Questions
Chapter 4: Restricting Access
14
4.1
Determining the Level of Access Required
4.2
Quiz for Determining the Level of Access Required
6 Questions
4.3
Understanding Least Privilege Policy
4.4
Quiz for Understanding Least Privilege Policy
6 Questions
4.5
Implementing Authentication
4.6
Quiz for Implementing Authentication
6 Questions
4.7
Introducing the Alphabet Soup of Compliance
4.8
Quiz for Introducing the Alphabet Soup of Compliance
6 Questions
4.9
Maintaining Compliance and CSPM
4.10
Quiz for Maintaining Compliance and CSPM
6 Questions
4.11
Controlling Access to the Cloud
4.12
Quiz for Controlling Access to the Cloud
8 Questions
4.13
Getting Certified
4.14
Quiz for Getting Certified
6 Questions
Chapter 5: Implementing Zero Trust
6
5.1
Making the Shift from Perimeter Security
5.2
Quiz for Making the Shift from Perimeter Security
5 Questions
5.3
Examining the Foundations of Zero Trust Philosophy
5.4
Quiz for Examining the Foundations of Zero Trust Philosophy
7 Questions
5.5
Dealing with Zero Trust Challenges
5.6
Quiz for Dealing with Zero Trust Challenges
6 Questions
Chapter 6: Using Cloud Security Services
10
6.1
Customizing Your Data Protection
6.2
Quiz for Customizing Your Data Protection
5 Questions
6.3
Validating Your Cloud
6.4
Quiz for Validating Your Cloud
7 Questions
6.5
HSM: Hardware Security Modules for the Big Kids
6.6
Quiz for HSM: Hardware Security Modules for the Big Kids
6 Questions
6.7
KMS: Key Management Services for Everyone Else
6.8
Quiz for KMS: Key Management Services for Everyone Else
7 Questions
6.9
Setting Up Crypto Service Gateways
6.10
Quiz for Setting Up Crypto Service Gateways
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Your Journey Starts Here
Course Catalog
About
Contact Us
Login/Sign Up
Modal title
Main Content