CSIT-2043: Introduction to Cloud Computing & Security

(TU-CSIT2043.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Architectural Concepts

  • Cloud Characteristics
  • Business Requirements
  • Cloud Computing Service Categories
  • Cloud Deployment Models
  • Multitenancy
  • Cloud Computing Roles and Responsibilities
  • Cloud Computing Reference Architecture
  • Virtualization
  • Cloud Shared Considerations
  • Emerging Technologies
  • Summary
  • Exam Essentials
2

Data Classification

  • Data Inventory and Discovery
  • Information Rights Management
  • Data Control
  • Summary
  • Exam Essentials
3

Cloud Data Security

  • Cloud Data Lifecycle
  • Cloud Storage Architectures
  • Threats to Cloud Storage
  • Designing and Applying Security Strategies for Storage
  • Summary
  • Exam Essentials
4

Security in the Cloud

  • Shared Cloud Platform Risks and Responsibilities
  • Cloud Computing Risks by Deployment Model
  • Cloud Computing Risks by Service Model
  • Virtualization
  • Disaster Recovery (DR) and Business Continuity (BC)
  • Cloud Design Patterns
  • Summary
  • Exam Essentials
5

Cloud Platform, Infrastructure, and Operational Security

  • Foundations of Managed Services
  • Shared Responsibilities by Service Type
  • Securing Communications and Infrastructure
  • Securing Hardware and Compute
  • Securing Software
  • Managing Virtual Systems
  • Assessing Vulnerabilities
  • Securing the Management Plane
  • Auditing Your Environment and Provider
  • Summary
  • Exam Essentials
6

Cloud Application Security

  • Developing Software for the Cloud
  • Cloud Application Architecture
  • Cloud-Secure Software Development Lifecycle (SDLC)
  • Cloud Application Assurance and Validation
  • Identity and Access Management
  • Summary
  • Exam Essentials
7

Operations Elements

  • Designing a Secure Data Center
  • Managing Security Operations
  • Summary
  • Exam Essentials
8

Operations Management

  • Monitoring, Capacity, and Maintenance
  • Change and Configuration Management
  • Problem and Incident Management
  • IT Service Management and Continual Service Improvement
  • Business Continuity and Disaster Recovery
  • Summary
  • Exam Essentials
9

Legal and Compliance Issues

  • Legal Requirements and Unique Risks in the Cloud Environment
  • Analyzing a Law
  • Legal Liability
  • Torts and Negligence
  • U.S. Privacy and Security Laws
  • International Laws
  • Laws, Regulations, and Standards
  • Information Security Management Systems
  • Privacy in the Cloud
  • Cloud Forensics
  • Audit Processes, Methodologies, and Cloud Adaptations
  • Summary
  • Exam Essentials
10

Cloud Vendor Management

  • The Impact of Diverse Geographical Locations and Legal Jurisdictions
  • Security Policy Framework
  • Enterprise Risk Management
  • Risk Treatment and Response
  • Risk Analysis
  • Cloud Contract Design
  • Government Cloud Standards
  • Manage Communication with Relevant Parties
  • Summary
  • Exam Essentials
11

Cloud Principles and Design

  • Understanding Cloud Principles
  • Exploring Cloud Design
  • Summary
  • Exam Essentials
12

Cloud Networking and Storage

  • Understanding Cloud Networking Concepts
  • Understanding Cloud Storage Technologies
  • Summary
  • Exam Essentials
13

Assessing Cloud Needs

  • Using Cloud Assessments
  • Understanding Cloud Services
  • Summary
  • Exam Essentials
14

Engaging Cloud Vendors

  • Understanding Business and Financial Concepts
  • Finding and Evaluating Cloud Vendors
  • Choosing a Migration Approach
  • Summary
  • Exam Essentials
15

Management and Technical Operations

  • Explain Aspects of Operating within the Cloud
  • Explain DevOps in Cloud Environments
  • Financial Planning of Cloud Resources
  • Summary
  • Exam Essentials
16

Governance and Risk

  • Recognize Risk Management Concepts Related to Cloud Services
  • Explain Policies or Procedures
  • Summary
  • Exam Essentials
17

Compliance and Security in the Cloud

  • Identify the Importance and Impacts of Compliance in the Cloud
  • Explain Security Concerns, Measures, or Concepts of Cloud Operations
  • Summary
  • Exam Essentials

1

Architectural Concepts

  • Creating a Virtual Machine and Installing Ubuntu Using Hyper-V Manager
2

Data Classification

  • Displaying Metadata Information
  • Capturing Network Traffic
3

Cloud Data Security

  • Taking an Incremental Backup
  • Taking a Full Backup
  • Creating a S3 Glacier Storage Using Lifecycle Rules
  • Observing an MD5-Generated Hash Value
  • Observing an SHA256-Generated Hash Value
  • Creating a CloudWatch Dashboard and Adding a Metric to it
4

Security in the Cloud

  • Performing a MITM Attack
  • Using Social Engineering Techniques to Plan an Attack
5

Cloud Platform, Infrastructure, and Operational Security

  • Configuring a Firewall for Inbound Rules
  • Setting Up a Honeypot on Kali Linux
  • Enabling an Access Control List
  • Creating a VPC
  • Creating a Network ACL
  • Configuring Outbound Rules for a Firewall
  • Creating an Elastic Load Balancer
  • Creating a NAT Gateway
6

Cloud Application Security

  • Configuring a Proxy Server
  • Conducting IP Spoofing
  • Conducting Cross-Site Request Forgery (CSRF or XSRF) Attacks
  • Attacking a Website Using Cross-Site Scripting (XSS) Injection
7

Legal and Compliance Issues

  • Completing the Chain of Custody
8

Cloud Vendor Management

  • Simulating the DDoS Attack
9

Cloud Principles and Design

  • Checking Hyper-V Compatibility
  • Enabling Hyper-V in Windows
  • Obtaining IP Route Information from the IP Routing Table
  • Installing a Virtual Machine
  • Installing the Remote Access Role
  • Creating a Virtual Switch
  • Installing Ubuntu
10

Cloud Networking and Storage

  • Creating and Applying an ACL at the CLI
  • Configuring Inbound Rules for a Firewall
  • Configuring Firewall Settings
  • Establishing a VPN Connection
  • Creating a NAT Virtual Network
  • Getting Information about DNS
  • Getting Information about the TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting TCP Settings
  • Obtaining Information about the Net Firewall Profile
  • Getting Information about the UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting UDP Settings
  • Obtaining Information about the IP Version
  • Obtaining the IP Interface
  • Generating a Key Pair Using Kleopatra
  • Using OpenSSL to Create a Public/Private Key Pair
  • Implementing a BPDU Guard on a Switch Port
  • Creating a New VLAN and Placing Switch Ports into that VLAN
  • Establishing an SSH Connection
11

Assessing Cloud Needs

  • Establishing a System Performance Baseline in Windows
  • Generating an RSA Key Pair
12

Management and Technical Operations

  • Configuring the NFS Data Store
  • Configuring RAID
  • Configuring RAID 5
13

Compliance and Security in the Cloud

  • Encrypting and Decrypting a File Using AES Crypt
  • Performing the Intense Scan in Zenmap
  • Observing the SHA-Generated Hash
  • Using the MD5 Hash Algorithm
  • Scanning a Network Using Nmap

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top