Ethical Hacking: Cloud Computing
![Pluralsight](https://static.mytechlogy.com/cache/198e0a947da0127606f2749b57b54665_w30_h30_cp_sc.png)
Pluralsight
Course Summary
"The Cloud" has made a huge difference to the way we deliver our software and services over recent years. But it's also changing the security landscape in both good and bad ways. This course looks at what changes with security in the cloud over traditional hosting models, and how we can best secure our solutions using this new paradigm. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
"The Cloud" is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn't more secure or less secure, rather it's differently secure; it strengthens security profiles in many areas whilst presenting new risks in others. Then again, many of the traditional risks in software don't change at all. In this course, we'll look at the ways the cloud can enable us to build more secure software than ever, whilst also identifying where it can leave us more vulnerable. We'll also look at "hardening" the cloud – how can we take this new computing paradigm and use it to strengthen our security profiles? This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Cloud Computing Concepts- 39m 18s
—Overview 2m 41s
—From On-premise to Cloud 6m 11s
—The Characteristics of a Cloud Service 6m 12s
—Understanding IaaS, PaaS, and SaaS 5m 45s
—Cloud Deployment Models 5m 15s
—The NIST Cloud Computing Reference Architecture 3m 26s
—The Promise of the Cloud 3m 9s
—Is the Cloud Secure? 4m 32s
—Summary 2m 3sOrganizational Security Considerations- 32m 47s
—Overview 2m 12s
—Everything Old Is New Again 1m 56s
—Data Sovereignty 9m 24s
—Compliance Assessments 6m 20s
—Client-driven Penetration Tests 2m 43s
—Commercial Considerations 2m 20s
—Shadow IT 4m 55s
—Summary 2m 53sCloud Computing Risks- 40m 41sCloud Computing Security Strengths- 34m 46sHardening the Cloud- 31m 30s