IT Security Gumbo_Cloud Computing Fundamentals

The Foundation of AWS Cloud Security

Instructed by Corey Charles

Want to access all courses?
Go for a premium subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now

Yearly

$ 299/yr
Billed Annually
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now
  • The ability to function in a cloud based environment

Cloud Security is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models--software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS)--the talk often turns to cloud security. Let’s build in this course

  • Students should have a basic understanding of network and web based security.
  • Basic understanding of security architecture is recommended
  • All levels of IT Security and Networking Professionals
  • All new students who are looking transition into cloud security
View More...

Section 1 : Introduction to Cloud Security

  • Lecture 1 :

Section 2 : Cloud Computing Foundation

  • Lecture 1 :
  • Cloud Computing Definitions
  • Lecture 2 :
  • Cloud Computing Roles
  • Lecture 3 :
  • Cloud Computing Benefits
  • Lecture 4 :
  • Drivers for Cloud Computing
  • Lecture 5 :
  • Define Cloud Computing
  • Lecture 6 :
  • Cloud Essential Characteristics
  • Lecture 7 :
  • Cloud Essential Characteristics Part 2
  • Lecture 8 :
  • Cloud Essential Characteristics Part 3
  • Lecture 9 :
  • Cloud Essential Characteristics Part 4
  • Lecture 10 :
  • Cloud Deployment Models
  • Lecture 11 :
  • Cloud Deployment Organizations
  • Lecture 12 :
  • Cloud Service Models
  • Lecture 13 :
  • Cloud and Asset Management
  • Lecture 14 :
  • Principles of Enterprise Architecture
  • Lecture 15 :
  • Principles of Enterprise Architecture Part 2

Section 3 : Cloud Computing Foundation

  • Lecture 1 :
  • Cloud Computing Security and Risk
  • Lecture 2 :
  • Cloud Security Concerns-Risk
  • Lecture 3 :
  • Cloud Security Concerns-Risk Part 2
  • Lecture 4 :
  • Cloud Security Concerns-Risk Part 3
  • Lecture 5 :
  • Cloud Security Concerns-Risk Part 4
  • Lecture 6 :
  • Cloud Security Concerns-Vulnerabilties
  • Lecture 7 :
  • Cloud Security Concerns-SLA
  • Lecture 8 :
  • Cloud Security Concerns-SLA Part 2
  • Lecture 9 :
  • Cloud Security Concerns- Legal
  • Lecture 10 :
  • Cloud Security Concerns- Legal 2
  • Lecture 11 :
  • Cloud Security Concerns- Legal 3
  • Lecture 12 :
  • The Stride Threat Model
  • Lecture 13 :
  • The Stride Threat Model Part 2
  • Lecture 14 :
  • The Treacherous Twelve
  • Lecture 15 :
  • The Treacherous Twelve Part 2
  • Lecture 16 :
  • The Treacherous Twelve Part 3
  • Lecture 17 :
  • The Treacherous Twelve Part 4
  • Lecture 18 :
  • The Treacherous Twelve Part 5
  • Lecture 19 :
  • The Treacherous Twelve Part 6
  • Lecture 20 :
  • The Treacherous Twelve Part 7
  • Lecture 21 :
  • The Treacherous Twelve Part 8
  • Lecture 22 :
  • The Treacherous Twelve Part 9
  • Lecture 23 :
  • The Treacherous Twelve Part 10
  • Lecture 24 :
  • The Treacherous Twelve Part 11
  • Lecture 25 :
  • The Treacherous Twelve Part 12

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$29

Need any help with the platform? Contact us at: support@learnfly.com