Virtualization

Secure Cloud Design [& some other stuff] (Module 6) – Security Fundamentals



Module 6 – Secure Cloud Network Design (and some other stuff)

In this module, we will look at the concepts and principles that encompass fundamentals of cloud computing, and the impacts it has on enterprise network security. We will also understand some of the underlying technology behind cloud computing.

As I am following CompTIA’s SY0-701 as the framework for this series, the embedded systems get crowbarred into this chapter. We’ll look at what are embedded systems, IoT, and it’s effect on the perimeter model of security and the need to focus on Zero Trust.

This is all based on how CompTIA Security+™ and LPI Security Essentials™ want to avoid knowledge that will age as IAM technologies evolve and grow, and rather give you the foundation to build upon with experience, further training and certifications.

Below are the time stamps for you to easily navigate and jump back to sections as and when you need to.

00:00:00 – Intro
00:00:32 – Section 1 Cloud Infrastructure
00:00:43 – Cloud Deployment Models
00:04:26 – Cloud Service Models
00:10:29 – Responsibility Matrix
00:21:09 – Centralized vs Decentralized Cloud Computing
00:24:51 – Replication
00:27:33 – Virtualization
00:36:32 – Containerization
00:38:24 – Newer Cloud Architecture Options
00:42:41 – Cloud Architecture Considerations
00:53:19 – Section 2 Embedded systems and other unusual networks
00:53:37 – Embedded Computer Systems
00:55:08 – Real Time Operating Systems
00:57:30 – Industrial Control Systems
01:01:12 – Internet of Things
01:07:50 – Internet of Things – Best Practices
01:11:25 – Perimeter Model
01:12:32 – Deperimeterization
01:14:26 – Zero Trust
01:16:16 – Components of Zero Trust
01:19:29 – Outro

——————————————————————
This Security Fundamentals series is intended to help you prepare for CompTIA Security+™, LPI Security Essentials™ and Google Cybersecurity Professional™, whether it be before you attend training, study the textbook or attempt the exam.
These videos are not recognised by the above mentioned certification vendors as official preparation material.
These videos should not violate any policies the above mentioned certification vendors have for unauthorized preparation material.
Support the channel directly –
——————————————————————
Credits
Pexels and the creators there for the images and videos.



source

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button