IT Security Gumbo: Cloud Security Technology

Introduction to Cloud Security

Instructed by Corey Charles

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • The students will learn about Web Application Vulnerability Management, The OSI Model and Cloud Security.

The IT Security Gumbo, ties in Web Application Vulnerability Management, The OSI Model and Cloud Security into a delicious course meal. The course gets into detail on the respective subject matter and gives a extensive tie on how they all work together. The course is geared towards all levels of IT Professionals.

  • You should have a general understanding of IT Security, Computer Networking and Cloud Security.
  • Anyone who wants to learn vulnerability management, computer networking and cloud security
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Web Application Security

  • Lecture 1 :
  • Mitre Att@ck
  • Lecture 2 :
  • Five Principles of Threat Based Security
  • Lecture 3 :
  • Functionality of DDOS/ TCP/IP/ HTTP/ HTTPS
  • Lecture 4 :
  • Web Security Techniques

Section 3 : The OSI Model

  • Lecture 1 :
  • Communication/Layer Architecture/ OSI/ OSI Reference Models/ 7 Layers
  • Lecture 2 :
  • OSIP: A Layer Network Model/ Layers 1-4 OSI Model
  • Lecture 3 :
  • Layers 5-7/ OSI Model/ TCP/IPModel

Section 4 : Cloud Security

  • Lecture 1 :
  • NIST Definition of Cloud Computing
  • Lecture 2 :
  • Cloud Essential Characteristics
  • Lecture 3 :
  • Cloud Service Models
  • Lecture 4 :
  • Cloud Deployment Models/ Cloud Roles/ Cloud Benefits
  • Lecture 5 :
  • Cloud Risks/Concerns
  • Lecture 6 :
  • Cloud Risk/Concerns Part 2
  • Lecture 7 :
  • Cloud Risk/ Concerns Part 3
  • Lecture 8 :
  • Cloud Risk/ Concerns Part 4
  • Lecture 9 :
  • Cloud Assurance/ CSA-The Notorious Nine
  • Lecture 10 :
  • CSA- The Notorious Nine Part 2
  • Lecture 11 :
  • CSA- The Notorious Nine Part 3
  • Lecture 12 :
  • CSA- The Notorious Nine Part 4/ Thank You for Attending

Section 5 : Bonus Lab

  • Lecture 1 :
  • Nessus Simulation
  • Lecture 2 :
  • ARP Lab
  • Lecture 3 :
  • Trunking
  • Lecture 4 :
  • Wireshark

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$19

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password