Cloud Security Basics

  • 4.7
Approx. 13 hours to complete

Course Summary

This course provides an introduction to cloud security basics, covering topics such as cloud computing, security risks, and best practices for securing cloud infrastructure.

Key Learning Points

  • Learn about the fundamental concepts of cloud computing and its security risks
  • Explore the best practices for securing cloud infrastructure and data
  • Understand the different types of cloud service models and deployment models

Related Topics for further study


Learning Outcomes

  • Understand the fundamental concepts of cloud computing and its security risks
  • Learn best practices for securing cloud infrastructure and data
  • Be able to identify the different types of cloud service models and deployment models

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer networks and security
  • Familiarity with cloud computing concepts

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video Lectures

Similar Courses

  • Cloud Security
  • Secure Cloud Computing

Related Education Paths


Related Books

Description

This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques.

Knowledge

  • Design a simple cloud service and select appropriate security measures to protect it.
  • Associate user roles with appropriate entities deploying or using a cloud service.
  • Assess levels of risk and recent vulnerabilities that apply to cloud services.
  • Learn and apply basic network security techniques in the cloud environment.

Outline

  • Introduction
  • Welcome to Cloud Security Basics
  • Introducing Internet Service Security
  • Step 1: Isolated Desktop Service
  • Scoring CIA Impacts
  • Attacking the Step 1 System
  • Step 2. Improved Robustness
  • Step 3. Separated Duties
  • User and Group Permissions
  • A Discussion Forum Scenario
  • Elements of an Internet Service Outline
  • Service Outline Example: Discussion Forum
  • Service Outline: Peer Review Assignment
  • An overview of Cloud Security Basics
  • Scenario 1-The Costly Schedule
  • Scenario 2-The Discussion Forum
  • Chapters from "Authentication: From Passwords to Public Keys"
  • Internet Service Security
  • Step 1
  • Step 2
  • Step 3
  • Steps 1 through 3
  • A Secure Network for a Private Cloud
  • Step 4. Adding Some Scale
  • Network Addressing
  • Network Protocol Layers
  • Networking Devices
  • Security Controls: Packet Filtering
  • Circuit and Content Control
  • Cloud Service Outline for Peer Review
  • Network Layers and Addressing
  • Network Structure
  • Traffic Filtering
  • Cryptography for Remote Access and Support
  • Step 5: Remote Administration
  • Secret Sharing with Public-Key Crypto
  • Transport Layer Security
  • Hashing for Authentication
  • Network Authentication
  • TLS Message Integrity
  • Classic SSL/TLS Using the RSA Cipher
  • Authenticating Network Servers
  • Digital Signatures
  • Validating a Public-Key Certificate
  • Who Signs a Public-Key Certificate?
  • Delegation and Certificate Chains
  • Securing the Step 5 Services
  • Describing an Attack using CVSS
  • Assessing a Vulnerability with CVSS
  • Assessment of CVE-2019-9945
  • Public Key Exchange and TLS
  • Crypto Authentication
  • Server Authentication
  • Public Key Certificates
  • Step 5 Services
  • Step 6 and Cloud Security
  • Step 6. Public Cloud Hosting
  • Deployment Models and Security
  • Cloud Service Architecture
  • Computer System Virtualization
  • Process Virtualization
  • Network Virtualization
  • Protocol Layers and Cryptography
  • Cloud Architecture and Security Planning
  • Notes on Constructing a Basic Cloud Security Plan
  • Cloud Architecture
  • Virtualization and Network Crypto

Summary of User Reviews

This course on cloud security basics has received positive reviews from many users. The course has been praised for its comprehensive coverage of cloud security and practical approach to the subject matter.

Key Aspect Users Liked About This Course

The course's comprehensive coverage of cloud security

Pros from User Reviews

  • Practical approach to the subject matter
  • Excellent course material
  • Engaging instructor
  • Great insights on cloud security
  • Good pace of learning

Cons from User Reviews

  • Some sections are too technical
  • Lack of hands-on exercises
  • Not suitable for beginners
  • Some topics are not covered in depth
  • Course may be too basic for experienced professionals
English
Available now
Approx. 13 hours to complete
Rick Smith
University of Minnesota
Coursera

Instructor

Rick Smith

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses