All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 9 Days!

Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Get Unlimited Learning Access
$29
9 days left at this price!

It Includes

  • Get Full Access to the platform
  • Access upto 16000+ online courses
  • Play & Pause Course Viewing
  • HD Recorded Lectures
  • Access on Mobile/PC/Tablet
  • Includes Real Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Cancel Anytime
$29
  • You will know the basics of cloud computing and cloud security
  • You will know how to design security architecture using a structured approach
  • You will know how security architecture is implemented in the cloud

This course gives an introduction to security architecture for the cloud. You as a cloud consumer must be able to docment, create and govern your security architecture. The purpose of security architecture work is to protect your data and services in the cloud from potential misuse from hackers and other unauthorized individuals. You have to know what the cloud service provider will do to protect you and what you have to take responsibility for yourself.

This course will teach you what type of focus you need when you start creating a security architecture and what steps you must complete in order to implement and document the security architecture you need for your cloud solutions The course will not go into cloud vendor sepcific details but point to relevant resources for further learning.

Did you know that, according to Gartner, through 2025, 99% of cloud security failures will be the customers fault?
Cloud misconfiguration is considered one of the highest ranking risks for cloud services and has already led to the exposure of billions of data records. This risk can be lowered considerable when having a structured approach to security architecture for the cloud and should the primary objective of completing this course.

Course contents:

  • Security Architecture

  • Cloud Computing

  • Shared responsibility model

  • Methodology and frameworks

  • Strategy, scope and context

  • Risk

  • Compliance

  • Logical security architecture

  • Layered defenses

  • Implementation and best practices

  • Cloud fundamentals
  • Basic IT Security
  • Understanding of IT architecture
  • Students in IT Security
  • Professionals working with cloud architecture and security
  • Security architects
View More...
  • Section 1 : Introduction 3 Lectures 00:06:56

    • Lecture 1 :
    • Introduction to the course Preview
    • In this lecture you will learn what cloud security architecture is and why we need it. You will also get an overview of the course objectives and its contents.
    • Lecture 2 :
    • What is Information Security Architecture?
    • Lecture 3 :
    • Security architecture principles
    • The same architectural principles apply to cloud infrastructure as to infrastructure in your own data center. Do you remember the principles important to security architecture?
  • Section 2 : Security in the cloud 4 Lectures 00:10:18

    • Lecture 1 :
    • Cloud Computing
    • Cloud computing basics
    • Lecture 2 :
    • Security in the cloud
    • Explanation of security in the cloud including the division of responsibility between the cloud customer and the cloud service provider
    • Lecture 3 :
    • Section summary
    • Lecture 4 :
    • Cloud shared responsibility
    • The cloud shared responsibility model is vital to understanding security architecture in the cloud. Do you remember what you, as a cloud customer, is responsible for?
  • Section 3 : Building a cloud security architecture 7 Lectures 00:13:27

    • Lecture 1 :
    • Steps for building a cloud security architecture
    • Lecture 2 :
    • Risk management
    • Lecture 3 :
    • Cloud implementation strategy
    • Lecture 4 :
    • Compliance
    • Lecture 5 :
    • Architecture documentation
    • Lecture 6 :
    • Section summary
    • Lecture 7 :
    • Methodology
    • A methodology will help you to be structured in your architecture work and to provide a holistic architecture covering many perspectives important to different groups of stakeholders. Do you remember what business needs a methodology can help fulfill?
  • Section 4 : Cloud security architecture implementation 11 Lectures 00:19:25

    • Lecture 1 :
    • Architecture implementation
    • Lecture 2 :
    • Governance and policies
    • Lecture 3 :
    • Identity and Access Management
    • Lecture 4 :
    • Data security
    • Lecture 5 :
    • Application security
    • Lecture 6 :
    • Network security
    • Lecture 7 :
    • Layered defenses
    • Lecture 8 :
    • Security operations
    • Lecture 9 :
    • Best practices and architecture resources
    • Lecture 10 :
    • Section summary
    • Lecture 11 :
    • Application Security
    • Many cybersecurity attacks happen on the application layer. As a cloud consumer it will be important to protect applications from adversaries. Do you remember the important considerations for application security?
  • Section 5 : Summary section 1 Lectures 00:01:33

    • Lecture 1 :
    • Course summary
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

48 Course Views

1 Courses

Im Aksel Bruun, a security architect in the Norwegian health sector. In my work, implementing security architecture in the cloud for Norwegian health trusts, i have gained experience in how to create security archcitecture using a holistic approach. As a security architect i have documented, communicated and implemented security archutecture in the cloud. I have also taught my colleagues and business partners about these topics on a national level. I currently hold the Certificate of Cloud Security Knowledge (CCSK) and SABSA Chartered Security Architect – Foundation Certificate (SCF).
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner Level 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner Level 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner Level 0:10:40
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lectures 18 Intermediate Level 2:4:20
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner Level 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner Level 3:28:56
Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.