Cloud Security
Showing 121–132 of 145 results
Regulating Resource Usage Using Google Cloud IAM
This course focuses on the design and implementation of role-based access control (RBAC) on the GCP. This includes the creation and appropriate use of service accounts, as well as primitive, predefined, and custom roles.
Scaling Culture of Resiliency in the Enterprise at Charter Communications
Nate Vogel, VP, Data Platforms, will share how he grew the data engineering team with an emphasis on building a culture of reliability.
Secure Cloud Applications, Users, and Related Technologies
The distributed nature of the cloud presents a challenge for protecting assets. This course will teach you the frameworks for securing cloud applications, users, and other assets.
Securing a Kafka Cluster
This course will teach you how to properly secure your Apache Kafka installation by leveraging its security features.
Securing Access to Microsoft Azure Storage
This course provides detail on the options available to secure the access to data services available in Azure Storage accounts.
Securing an EKS Cluster
This course will teach you the security compliance concepts of the Kubernetes cluster, how to secure microservices at scale and Ensure the safety of the cluster from any security or third-party violations.
Securing an OpenShift Cluster
This course will teach you the core skills to secure an OpenShift cluster.
Securing Azure Kubernetes Service (AKS) Clusters
This course will teach you to design, configure, and manage cluster security in Azure Kubernetes Service. Focusing on API server access, authentication, authorization, and network policies.
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
The usage of DevOps tools like Docker and Kubernetes has expanded. This course introduces you to securing cloud DevOps environments in PaaS, IaaS, and SaaS settings, DevOps practices, and activities across various types of cloud platforms.
Securing Docker Container Workloads
Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications.
Securing Microsoft 365 Messaging Environments
Microsoft 365 has implemented three products that include security, protection, and compliance websites. This course will introduce you to all three systems so that you'll be able to create a functional and secure messaging system.
Securing Microsoft Azure Data Access Endpoints
This course provides detail on the technologies and options available to secure the endpoints of data services that are available in Azure.