Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cloud Architectures and Security (T4-IT53)
Unit 1 Cloud computing fundamentals
Session 1 : Cloud computing definition
Session 2 : Private, public and hybrid cloud
Session 3 : Cloud types; IaaS, PaaS, SaaS
Session 4 : Cloud architecture
Session 5 : Benefits and challenges of cloud computing
Session 6 : Role of virtualization in enabling the cloud
Session 7 : Benefits and challenges to Cloud architecture
Session 8 : Cloud security and disaster recovery
Session 9 : Next generation Cloud Applications
Session 10 : Advantages and disadvantages of cloud
Unit 2 Security concepts
Session 11 : Confidentiality
Session 12 : privacy
Session 13 : integrity
Session 14 : authentication
Session 15 : non repudiation
Session 16 : availability
Session 17 : access control
Session 18 : defense in depth
Session 19 : least privilege
Session 20 : how these concepts apply in the cloud
Session 21 : What these concepts mean and their importance in PaaS,
Session 22 : IaaS and SaaS. e.g. User authentication in the cloud
Session 23 : Cryptographic Systems- Symmetric cryptography
Session 24 : stream ciphers
Session 25 : block ciphers
Session 26 : modes of operation
Session 27 : public-key cryptography
Session 28 : hashing
Session 29 : digital signatures
Session 30 : public-key infrastructures
Session 31 : key management
Session 32 : X.509 certificates
Session 33 : Open SSL
Unit 3 Multi-tenancy issues
Session 34 : Isolation of users/VMs from each other. How the cloud provider can provide this
Session 35 : Virtualization System Security Issues- e.g. ESX and ESXi Security
Session 36 : ESX file system security
Session 37 : storage considerations, backup and recovery
Session 38 : Virtualization System Vulnerabilities- Management console vulnerabilities
Session 39 : management server vulnerabilities
Session 40 : administrative VM vulnerabilities
Session 41 : guest VM vulnerabilities
Session 42 : hypervisor vulnerabilities
Session 43 : hypervisor escape vulnerabilities
Session 44 : configuration issues
Session 45 : malware (botnets etc)
Unit 4 Virtualization system-specific attacks
Session 46 : Guest hopping
Session 47 : attacks on the VM (delete the VM, attack on the control of the VM, code or file injection into the virtualized file structure)
Session 48 : VM migration attack
Session 49 : hyperjacking
Unit 5 Technologies for virtualization based security enhancement
Session 50 : IBM security virtual server protection
Session 51 : virtualization-based sandboxing
Session 52 : Storage Security- HIDPS
Session 53 : log management
Session 54 : Data Loss Prevention
Session 55 : Location of the Perimeter
Unit 6 Legal and compliance issues
Session 56 : Responsibility
Session 57 : ownership of data
Session 58 : right to penetration test
Session 59 : local law where data is held
Session 60 : examination of modern Security Standards (eg PCIDSS)
Session 61 : how standards deal with cloud services and virtualization
Session 62 : compliance for the cloud provider vs.compliance for the customer
Session 47 : attacks on the VM (delete the VM, attack on the control of the VM, code or file injection into the virtualized file structure)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock