From the course: CompTIA Cloud (CV0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Choose the protocol to secure cloud traffic
From the course: CompTIA Cloud (CV0-003) Cert Prep
Choose the protocol to secure cloud traffic
- We make connections to resources and all kinds of things within the cloud, and we need to make sure that that traffic is secure. How do we do that? What do we have available? Stick around as that conversation is starting right now. (upbeat music) - You're watching ITProTV. - Hello ladies and gentlemen. Thank you for tuning in to more of the CompTIA Cloud . That's right, we're going to talk about securing traffic between our machines and in the cloud, and maybe even some securing of the traffic that's traversing the cloud as well. And you know, Ronnie, this might be something where maybe some people don't realize that we have more that's available to us than you might think, right? In some of the demos that we've shown you, we're opening a web browser and we're connecting to cloud-based resources. And you might say, well, Wes, we know that we have secure HTTP, but you might be surprised to learn that that's not the only option that you have and certainly not the only traffic that you…
Contents
-
-
-
(Locked)
Identify and discuss IAM15m 15s
-
(Locked)
Identify and discuss IAM demo15m 55s
-
(Locked)
Identify and configure security access controls17m 35s
-
(Locked)
Security access controls demo14m 6s
-
(Locked)
Analyze the IAM solutions20m 33s
-
(Locked)
Explain network segmentation in cloud security15m 5s
-
(Locked)
Network segmentation in cloud security demo7m 35s
-
(Locked)
Explain network services in cloud security20m 59s
-
(Locked)
Network services in cloud security demo16m 39s
-
(Locked)
Choose the protocol to secure cloud traffic21m 40s
-
(Locked)
Protocols to secure cloud traffic demo16m 6s
-
(Locked)
Describe hardening and configuration changes15m 32s
-
(Locked)
Hardening cloud-based resources demo13m 39s
-
(Locked)
Analyze the security solutions11m 31s
-
(Locked)
Identify different application security controls21m 8s
-
(Locked)
Identify different OS security controls17m
-
(Locked)
Analyze app and OS security control solutions9m 29s
-
(Locked)
Explain data security controls in the cloud20m 20s
-
(Locked)
Explain compliance controls in the cloud17m 42s
-
(Locked)
Data and compliance controls demo17m 59s
-
(Locked)
Analyze data and compliance controls7m 10s
-
(Locked)
Meet security requirements in the cloud21m 42s
-
(Locked)
Security requirements in the cloud demo14m 13s
-
(Locked)
Analyze security requirement solutions9m 35s
-
(Locked)
Review incident response procedure16m 50s
-
(Locked)
-
-
-