Cloud Security Concepts
Cloud Security Concepts Overview
In this episode, you will meet your hosts for this series as well as go over some of the topics that will be covered in the course.
0h 1m
(Upbeat Music) Welcome and
thanks for joining us for this
overview for the course on
cloud security concepts.
I'm Sophie Goodwin and I'll be
your host, kind of your learner
advocate throughout this
course, asking questions along
the way that you might have at
home. I am certified in
cybersecurity from ISC2.
So I have a little bit of
background in this, but the guy
that's gonna be leading this
expedition, if you will, I
sound like Chat GPT, is Mr.
Daniel Lowry. He's gonna be our
subject matter expert for,
yeah. He's got some vision
problems, so we'll be patient
with him. He's gonna be our
subject matter expert for this
course. So Daniel, I'm curious,
tell us a little bit about
you. A little bit about me,
well, I've used a computer
before. That's good. That was
fun. I joined it so much, I
made a career out of it.
Wow. For 20 some odd years at
this point in time. So I've
seen a lot of technologies come
and go and cloud being no
exception and cloud being
probably is the thing, right?
Everybody's moving to the
cloud. You're not in the cloud
now, you're a caveman. So you
gotta get there and security is
the other big thing. We gotta
marry these two things
together.
So my background has been using
mostly with AWS, SARS Cloud
goes, but I do have an
extensive security background
as well. I do cybersecurity for
the most part and I have done
cybersecurity for cloud
systems.
That's why I'm here
helping you today. That's
good to know, because we are
talking about cloud security
quite a bit in this course,
but specifically without giving
too much away, can you maybe
give us a hint as to what we're
gonna learn in this course?
So this is kind of a
conceptual course, right?
I wanna kind of give you those
basics, those foundational
nuggets of knowledge that are
gonna help you as you move into
a practitioner. Okay, so
we're gonna learn a lot of
things when it comes to
vulnerability management.
It's one of the bigger
kind of concepts that you need
to be around cloud compliance
and regulation and another big
dog on the block, but also
cloud access, how do we access
things? How do we work with
things like IAM, the identity
and access management systems
found in a lot of cloud
environments, looking at
security best practices, as
well as security controls and
different attacks that you
might encounter in your
cloud-based systems. Okay,
so for folks that are
watching this overview,
thinking they might wanna join
us for this course, should they
have any prerequisite
knowledge? Like who is this
course for?
This course is definitely
aimed toward the beginner,
right? Oh, good. So if you have
some knowledge of just general
computing, that will definitely
be helpful, knowing Windows
operating system, maybe a
little bit of Linux here and
there, and just technology in
general, web browsing, going
through those things. You don't
have to be necessarily a cloud
guru at all either, but some
basic fundamental understanding
of just
what AWS is, what Azure is,
what GCP is, and how they get
used. It would be helpful, but
not necessary. Okay,
from there, we are going to
then look into giving you those
pieces of knowledge of, in
those systems, what are my
options when it comes to
security? What are the things I
need to be on the lookout for?
Okay, so even if some of
that stuff wasn't super
familiar to you, you should be
able to play a little bit of
catch-up while you're watching
this course, as opposed to
playing mustard. That was a bad
joke. (Laughs) We're gonna go
ahead and call it there, and I
feel like now we've got some
insight into Daniel's
background and why he's here
teaching us this stuff, and of
course, some things that you
can expect in this course, but
that's gonna do it for this
overview. Thanks so much for
joining us, and we will see you
in the Cloud Security Concepts
course. (Upbeat Music)
Overview
In this course, we will introduce you to many essential cloud security concepts, covering foundational principles and practices for protecting data and applications in cloud environments.
Students will learn about cloud security frameworks, common attacks, and compliance requirements, along with strategies for safeguarding against common threats through security best-practices.
Ideal for cloud-security beginners, this course equips learners with the knowledge needed to pursue advanced cloud security topics.
Learning Style
On Demand
Length of course
3h 19m
11 Episodes
Here are the topics we'll cover
- Course Overview
- Cloud Vulnerability Management
- Cloud Compliance and Regulation
- Secure Cloud Access
- Cloud Security Best Practices
- Cloud Security Controls
- Cloud Attacks
Learning Options