IT403: Cloud Security

(PG-IT403.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Data Classification

  • Data Inventory and Discovery
  • Jurisdictional Requirements
  • Information Rights Management (IRM)
  • Data Control
  • Summary
  • Exam Essentials
  • Written Labs
2

Cloud Data Security

  • Cloud Data Lifecycle
  • Cloud Storage Architectures
  • Cloud Data Security Foundational Strategies
  • Summary
  • Exam Essentials
  • Written Labs
3

Security in the Cloud

  • Shared Cloud Platform Risks and Responsibilities
  • Cloud Computing Risks by Deployment Model
  • Cloud Computing Risks by Service Model
  • Virtualization
  • Disaster Recovery (DR) and Business Continuity (BC)
  • Summary
  • Exam Essentials
  • Written Labs
4

Responsibilities in the Cloud

  • Foundations of Managed Services
  • Business Requirements
  • Shared Responsibilities by Service Type
  • Shared Administration of OS, Middleware, or Applications
  • Shared Responsibilities: Data Access
  • Lack of Physical Access
  • Summary
  • Exam Essentials
  • Written Labs
5

Cloud Application Security

  • Training and Awareness
  • Cloud-Secure Software Development Lifecycle (SDLC)
  • ISO/IEC 27034-1 Standards for Secure Application Development
  • Identity and Access Management (IAM)
  • Cloud Application Architecture
  • Cloud Application Assurance and Validation
  • Summary
  • Exam Essentials
  • Written Labs

1

Data Classification

  • Displaying Metadata Information
  • Creating a Standard ACL
  • Enabling an Access Control List
2

Cloud Data Security

  • Building IPSec VPN
  • Configuring RAID 5
  • Generating a Symmetric Key
  • Generating an Asymmetric Key
  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
3

Security in the Cloud

  • Performing a DoS Attack with SYN Flood
  • Performing a MITM Attack
  • Using Social Engineering Techniques to Plan an Attack
  • Installing Web Application Proxy
  • Performing a Credential-Based Brute-Force Attack
  • Taking a Full Backup
  • Taking an Incremental Backup
4

Responsibilities in the Cloud

  • Setting Up a Honeypot on Kali Linux
  • Configuring a Firewall for Inbound Rules
  • Removing Unnecessary Services
  • Using the Event Viewer
5

Cloud Application Security

  • Authorizing a User
  • Examining File Permissions
  • Conducting Cross-Site Request Forgery with Low Complexity
  • Attacking a Website Using Cross-Site Scripting (XSS) Injection
  • Conducting IP Spoofing
scroll to top