Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cloud Architectures and Security (T4-IT53)
Unit 1 Cloud computing fundamentals
Session 1 : Cloud computing definition
Session 2 : Private, public and hybrid cloud
Session 3 : Cloud types; IaaS, PaaS, SaaS
Session 4 : Cloud architecture
Session 5 : Benefits and challenges of cloud computing
Session 6 : Role of virtualization in enabling the cloud
Session 7 : Benefits and challenges to Cloud architecture
Session 8 : Cloud security and disaster recovery
Session 9 : Next generation Cloud Applications
Session 10 : Advantages and disadvantages of cloud
Unit 2 Security concepts
Session 11 : Confidentiality
Session 12 : privacy
Session 13 : integrity
Session 14 : authentication
Session 15 : non repudiation
Session 16 : availability
Session 17 : access control
Session 18 : defense in depth
Session 19 : least privilege
Session 20 : how these concepts apply in the cloud
Session 21 : What these concepts mean and their importance in PaaS,
Session 22 : IaaS and SaaS. e.g. User authentication in the cloud
Session 23 : Cryptographic Systems- Symmetric cryptography
Session 24 : stream ciphers
Session 25 : block ciphers
Session 26 : modes of operation
Session 27 : public-key cryptography
Session 28 : hashing
Session 29 : digital signatures
Session 30 : public-key infrastructures
Session 31 : key management
Session 32 : X.509 certificates
Session 33 : Open SSL
Unit 3 Multi-tenancy issues
Session 34 : Isolation of users/VMs from each other. How the cloud provider can provide this
Session 35 : Virtualization System Security Issues- e.g. ESX and ESXi Security
Session 36 : ESX file system security
Session 37 : storage considerations, backup and recovery
Session 38 : Virtualization System Vulnerabilities- Management console vulnerabilities
Session 39 : management server vulnerabilities
Session 40 : administrative VM vulnerabilities
Session 41 : guest VM vulnerabilities
Session 42 : hypervisor vulnerabilities
Session 43 : hypervisor escape vulnerabilities
Session 44 : configuration issues
Session 45 : malware (botnets etc)
Unit 4 Virtualization system-specific attacks
Session 46 : Guest hopping
Session 47 : attacks on the VM (delete the VM, attack on the control of the VM, code or file injection into the virtualized file structure)
Session 48 : VM migration attack
Session 49 : hyperjacking
Unit 5 Technologies for virtualization based security enhancement
Session 50 : IBM security virtual server protection
Session 51 : virtualization-based sandboxing
Session 52 : Storage Security- HIDPS
Session 53 : log management
Session 54 : Data Loss Prevention
Session 55 : Location of the Perimeter
Unit 6 Legal and compliance issues
Session 56 : Responsibility
Session 57 : ownership of data
Session 58 : right to penetration test
Session 59 : local law where data is held
Session 60 : examination of modern Security Standards (eg PCIDSS)
Session 61 : how standards deal with cloud services and virtualization
Session 62 : compliance for the cloud provider vs.compliance for the customer
Session 43 : hypervisor escape vulnerabilities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock