Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Provider Logo

Cybersecurity with Cloud Computing

via LinkedIn Learning


Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.

More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.


  • Making your cloud deployments secure
  • What you should know
1. Cloud Foundations
  • Cloud security guidance
  • Essential characteristics
  • Cloud services
  • Infrastructure as a service
  • Platform as a service
  • Software as a service
  • Deployment models
  • Hypervisors and visualization
2. Looking at the Clouds
  • Microsoft Azure
  • Command-line access to Azure
  • Amazon Web Services
  • Command-line access to Amazon
  • Google Apps
  • Security as a service
  • Cloud provider SECaaS
  • An insight into Rapid7's SECaaS
3. Cloud Flaws, Incidents. and Failures
  • Incidents in the cloud
  • Anatomy of a service failure
  • Anatomy of a business failure
  • Incident response
  • Azure recommendations on incident management
  • Cloud resilience
4. Hands-On with Cloud Flaws
  • Unauthorised access to buckets by anyone
  • Unauthorized account access to buckets
  • Searching for account keys
5. Cloud Security Management
  • Architecting governance and risk
  • Legal, compliance, and audit
  • Information governance
  • Application security
  • Deploying and operating applications
6. Cloud Security Capabilities
  • Cryptography foundations
  • Data security and encryption
  • Identity in the cloud
  • Controlling access to cloud objects
  • Setting up access control in AWS
  • Logging and monitoring in the cloud
  • VM monitoring with Azure
What's Next
  • Next steps

Taught by

Malcolm Shore

Related Courses


0.0 rating, based on 0 reviews

Start your review of Cybersecurity with Cloud Computing

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free