IT Security Gumbo-Unveiling Network and Cloud Security

Foundations of Azure Networking Cloud Security |Real World Projects

Instructed by Corey Charles

Want to learn more?
Go for Premium Subscription

Choose your plan:

  • Monthly
  • Annually
$ 29
Monthly Subscription
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
Need Help?

Call +1 855 999 1795

( Toll Free )
  • Networking, Cloud Security

The IT Security Gumbo: Unveiling Network and Cloud Security focuses on the fundamentals of computer networking which takes a focus on routing and switching, the OSI Model, variations of IP's. It also focuses on Cloud Security characteristics, cloud service, the notorious nine, cloud risk and more. We also provide a bonus for our students that will be unveiled once the student is apart of the course. 
 
The Cloud Security Portion features and discusses the following and more:
 
Data Security in the Cloud
 
Encryption types and availability
Key management and encryption architectures
Data/information lifecycle
Retention
Disposal
Classification
Intrusion Detection and Incident Response
 
Incident detection for different cloud models
Managing Intrusion Detection System/Intrusion Prevention System (IDS/IPS) and alerting
The event management feedback loop
Risk, Audit, and Assessment for the Cloud
 
Risk management
Auditing the cloud
Remote
Onsite
CloudAudit A6
Assessments for the cloud
Penetration testing the cloud
Internal assessments

  • Basic understanding of computer networking and computer security.
  • All IT Security/ Netorking and Cloud Security Professionals
  • students will be able to apply knowledge to real world projects.
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Cloud Security

  • Lecture 1 :
  • NIST Definition of Cloud Security
  • Lecture 2 :
  • Cloud Essential Characterisitics
  • Lecture 3 :
  • Cloud Service Models
  • Lecture 4 :
  • Cloud Deployment Models/ Cloud Roles/ Cloud Benefits
  • Lecture 5 :
  • Cloud Risks/ Concerns Part 1
  • Lecture 6 :
  • Cloud Risks/ Concerns Part 2
  • Lecture 7 :
  • Cloud Risks/ Concerns Part 3
  • Lecture 8 :
  • Cloud Risks/ Concerns Part 4
  • Lecture 9 :
  • Cloud Assurance/ CSA-The Notorious Nine
  • Lecture 10 :
  • CSA The Notorious Nine Part 2
  • Lecture 11 :
  • CSA The Notorious Nine Part 3
  • Lecture 12 :
  • CSA The Notorious Nine Part 4

Section 3 : Networking

  • Lecture 1 :
  • Data Encapsulation
  • Lecture 2 :
  • Internet Protocol
  • Lecture 3 :
  • IP Addressing
  • Lecture 4 :
  • IP Classes
  • Lecture 5 :
  • IPv6
  • Lecture 6 :
  • OSI Model
  • Lecture 7 :
  • Public and Private IP
  • Lecture 8 :
  • Reserved IP
  • Lecture 9 :
  • TCP IP Model

Section 4 : Networking Lab

  • Lecture 1 :
  • ARP Lab
  • Lecture 2 :
  • Trunking
  • Lecture 3 :
  • Switch Security

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...
ethical-hacking-and-penetration-testing

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

implementing-configuring-cisco-routers-part-1

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$15

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now