Design a simple cloud service and select appropriate security measures to protect it.
Associate user roles with appropriate entities deploying or using a cloud service.
Assess levels of risk and recent vulnerabilities that apply to cloud services.
Learn and apply basic network security techniques in the cloud environment.
Earn a shareable certificate to add to your LinkedIn profile.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
Here we introduce Internet server security in six steps, covering the first three in detail.
We examine techniques to control how different hosts interact within a network.
Modern systems rarely reside inside a single trust boundary. We use cryptography to protect information when it travels outside our trust boundary.
The public cloud provides both operational benefits and security challenges. We use concepts from the earlier modules to address cloud security challenges.