Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Cloud and Wireless Security

(ISC)² via Coursera


Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both transformations are complex topics. However, as a security practitioner, we can narrow these two topics by applying the security fundamentals to secure the data. This boils down to the three basics of protecting data at rest, in motion, and in use. The data is either on the endpoint devices, servers, or other endpoints, making these services a reality. Course 6 Learning Objectives After completing this course, the participant will be able to:  L6.1 - Recall cloud security concepts and configurations. L6.2 - Recognize types of virtualization and cloud security considerations. L6.3 - Summarize the types of telecommunications and network access controls. Course Agenda Module 1: Operate and Configure Cloud Security (Domain 7 - Systems and Application Security) Module 2: Cloud Security Considerations (Domain 6 - Network and Communications Security) Module 3: Secure Wireless Configurations (Domain 6 - Network and Communications Security) Who Should Take This Course: Beginners Experience Required: No prior experience required


  • Module 1: Operate and Configure Cloud Security
    • We have all seen the extraordinary growth in the area of cloud computing fueled, at least in part, by the advances in virtualization and storage technologies. Cloud computing offers subscribers almost unlimited possibilities, but it also presents some formidable challenges regarding information security. The security professional must have a thorough knowledge of cloud concepts and the security implications of outsourced IT in general. Let’s begin by examining the essential characteristics. 
  • Module 2: Cloud Security Considerations
    • It’s time to take a closer look at virtualization and how it is both the strength and the attractive nuisance or “threat magnet” aspect of hosting an organization’s business processes and data in the cloud. We know why we have to protect information assets no matter where they are hosted, how they are in motion, or how they are being used. As to how, almost every week the specific details change for each cloud services provider not only as they add new features and capabilities but also because they respond to new vulnerabilities and attack attempts.  Instead, this module will concentrate more on what to protect. 
  • Module 3: Secure Wireless Configurations
    • In this module, we discuss how the many different digital, analog and other technologies common to our personal and professional lives have converged or come together in nearly seamless ways. This convergence of technologies has shifted the way we work and communicate with others. It’s almost easier to make a list of technologies that are not part of this converged communication than it is to include them all. We won’t try to cover them all here in module 3. TCP/IP and the OSI 7-Layer protocol stacks have already been covered, as have many of the basic software technologies. We’ve also looked at access control as a fundamental need when allowing mobile devices to connect to those IP networks regardless of the physical layer they use to start that connection process with.  In that sense, this module looks further at the ways things work at layers 2 and above in those protocol stacks. We’ll focus on security needs that the various systems require and highlight some key issues along the way.  Doing so will help us put voice over IP (VoIP) and other converged communications systems and their use cases into a security context. 
  • Module 4: Chapter 6 Review
    • Information systems and assets that have been fully or partially migrated into a cloud hosted environment is a straightforward process, as we’ve seen in this chapter. Straightforward, yes, but a process that requires significant specialist knowledge and skill regarding the cloud services providers’ architecture, systems, and security tools. Central to securing a cloud-hosted system is the virtualization that makes it work. As you gain experience with cloud systems security, you’ll need to strengthen your own working knowledge of virtual systems and how to secure, manage, deploy and monitor them. It may seem to be a large mental shift to move away from tangible hardware devices that you physically configure to using GUIs and scripts to configure virtual devices — simulations of routers and firewalls running as software-only entities — but in reality, most security professionals and many network engineers spend much of their effort using scripts and GUIs to manage their existing physical IT and OT infrastructures.  The continued convergence of communications brings our security thinking to a different perspective on cloud security, when we accept that many of these new people-facing services, such as full-function collaboration suites, are cloud native to begin with. This also guides us to plan for and include in the organization’s overall IT and OT architectures the many different types of communications technologies and systems being used.

Taught by

(ISC)² Education & Training


4.8 rating at Coursera based on 33 ratings

Start your review of Cloud and Wireless Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.