Course description

Course preview

    • 0_Course_Introduction

      01:10
      • 0 Course Introduction
        01:10
    • Understanding Importance of Cloud Security

      16:34
      • 1 Cloud Security
        02:05
      • 2 Introduction
        05:16
      • Innodb 12
        00:39
      • 4 Data Breach
        00:35
      • 5 Insufficient Identity Credential and Access Management
        00:24
      • 6 Insecure Interfaces and APIs
        00:59
      • 7 System Vulnerability
        00:57
      • 8 Account Hijacking
        00:34
      • 9 Malicious Insiders
        00:35
      • 10 Advanced Persistent Threats
        00:31
      • 11 Data Loss
        00:35
      • 12 Insufficient Due Diligence
        00:18
      • 13 Introduction to Abuse and Nefarious Use of Cloud Services
        00:36
      • 14 Denial of Service
        00:39
      • 15 Shared Technology Vulnerabilities
        01:41
      • 16 Key Takeaways
        00:10
      • Knowledge Check
    • Public Key Infrastructure

      07:06
      • 1 Public Key Infrastructure
        00:26
      • 2 PKI Concepts
        02:48
      • 3 Working of SSL
        03:37
      • 4 Key Takeaways
        00:15
      • Knowledge Check
    • Shell Scripting

      45:48
      • 1 Shell Scripting
        00:30
      • 2 Benefits of shell scripting
        02:13
      • 3 Working with Shell Commands
        12:03
      • 4 Basics of a Bash Script
        10:23
      • 5 Perl Scripting
        06:52
      • 6 python scripting
        05:56
      • 7 Basic Troubleshooting Tools
        01:44
      • 8 Demo : Shell script that finds the sum and average of a list of integers
        02:49
      • 9 Demo : Shell script that reports the number of file names consisting of seven characters
        01:55
      • 10 Demo : Shell script that prints its arguments in reverse order
        01:04
      • 11 Key Takeaways
        00:19
      • Knowledge Check
    • Encryption

      14:42
      • 1 Encryption
        00:16
      • 2 Introduction to Cryptography
        01:38
      • 3 Symmetric and Asymmetric Encryption
        04:27
      • 4 Hash Algorithm
        08:10
      • 5 Key Takeways
        00:11
      • Knowledge Check
    • {{childObj.title}}

      • {{childObj.childSection.chapter_name}}

        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

    Contact Us

    +1-844-532-7688

    (Toll Free)

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.