Final Exam: Network Security Specialist
Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Final Exam: Network Security Specialist will test your knowledge and application of the topics presented throughout the Network Security Specialist track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
Expected Duration (hours)
0.0
Lesson Objectives Final Exam: Network Security Specialist
apply the secure software development lifecycle
classify key management services
compare client and server-side encryption
configure stateful firewalls in the cloud
define file and database security
define IAM roles
define object storage security
define privacy issues and jurisdiction
define shared responsibility
define the basics of risk management
define training and awareness security
describe challenges introduced by different types of cloud platforms such as public, private, hybrid, and community
describe cloud computing definitions and roles
describe common cloud vulnerabilities such as negligence, cyber threats, and system vulnerabilities
describe common cryptographic protocols
describe common development lifecycles
describe compute technologies
describe considerations when evaluating cloud service providers
describe considerations when using the PaaS cloud service model
describe key cloud characteristics
describe key legal considerations when moving to the cloud
describe legal requirements and risks
describe software assurance and validation
describe storage technologies
describe the benefits of cloud offerings such as AWS and Azure
describe the common deployment and migration strategies
describe the SaaS cloud service model
describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
describe the three-tier design model
describe virtualization technologies
describe web application firewalls
design and plan security controls
differentiate between cloud computing roles such as cloud service customer, cloud service architect, and cloud auditor
differentiate between data ownership and data custody
differentiate between on-premise and cloud implementations
differentiate between physical and logical infrastructure for cloud operations
ensure compliance with regulations and controls, like ITIL and ISO/IEC 20000-1
list common clouds infrastructure components such as network, virtualization, and computer
list data security strategies such as encryption and key management
list network security concepts such data and media sanitization
list potential threats against cloud computing infrastructure
list requirements for business continuity strategy
list specifics about cloud application architecture such as supplementary security components, cryptography, and sandboxing
list the importance of performing a cost-benefit analysis
list virtualization security concepts such as hypervisor and container security
manage compliance with regulations and controls
provide an overview of the IaaS cloud service model
recognize challenges of cloud service such as IaaS, PaaS, SaaS
recognize considerations related to cloud management
recognize considerations when moving applications to the cloud
recognize different privacy concerns such as private data and jurisdictional concerns
recognize factors that can impact confidentiality, integrity, and availability of cloud data
recognize how to implement operational controls and standards
recognize key access control considerations
recognize requirements for disaster recovery strategy
secure management access
secure the root account
specify cloud benefits, components, and service models
use audit processes and methodologies in the cloud
use verified secure software
Course Number: it_fecosa_01_enus
Expertise Level
Intermediate