Fundamental to cloud service security are the construction and design of secure data centers and their hosted hardware and systems. Explore how to implement, operate, and manage physical and logical cloud infrastructure. This 16-video course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Key concepts covered in this course include: how to recognize security configuration requirements such as basic input/output system (BIOS), settings for Trusted Platform Module (TPM), keyboard, video, and mouse (KVM) switches, hardware security module (HSM), storage and network controllers; techniques to secure network configuration and network support tools including virtual local area network (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP) and Authorized DHCP, Domain Name System (DNS), and Internet Protocol Security (IPsec); the deployment of network security-related controls, including firewalls, intrusion detection system (IDS), intrusion prevention system (IPS), honeypot deployment, and vulnerability assessment/threat mitigation; connect to a Azure Linux virtual machine (VM) using Secure Shell (SSH); and how to enable Azure VM metric alerts, on-premises file server cloud backup, and VM cloud backups.
recognize hardware specific security configuration requirements such as BIOS, settings for TPM, KVM switches, HSM, storage controllers, and network controllers
deploy a cloud virtual machine using a template
install Microsoft Azure virtual machine extensions
define techniques to secure network configuration and network support tools, including VLAN, TLS, DHPC and Authorized DHCP, DNS, and IPsec
define the deployment of network security-related controls, including firewalls, IDS, IPS, honeypot deployment, and vulnerability assessment/threat mitigation
describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization, maintenance mode, and general high availability best practice adoption
define operating system hardening techniques with reference to operating systems like Windows, Linux, VMware, etc.
deploy Microsoft Azure virtual machines into an availability set
connect to a Microsoft Azure Windows virtual machine using RDP
connect to a Microsoft Azure Linux virtual machine using SSH
view Microsoft Azure virtual machine metrics
enable Microsoft Azure virtual machine metric alerts
enable on-premises file server cloud backup
enable Microsoft Azure virtual machine cloud backups