Video description
The cloud is fast proving to be one of the most significant evolutions in computing and IT since the advent of the internet itself. It’s changing the way companies and organizations of all types and sizes conduct business in a manner that few other innovations over the past decade or more have done. But as much as the cloud has brought about a revolution in how we work, shop, socialize, and consume entertainment, it is also a target-rich environment for bad actors looking to steal data or simply wreak havoc for its own sake. Barely a day goes by that there’s not a story in the news of yet another data breach, and for companies today, these types of episodes can destroy reputations and entire businesses. This mean that to stay competitive and safeguard some of your company's most valuable assets—its data—you need to ensure that you and your cloud provider are proactive in defending against threats to your cloud-based infrastructure.
In this video course designed for intermediate-level IT architects and security engineers, your host, IBM Distinguished Engineer and executive security architect for IBM Cloud, Chris Dotson, teaches you what you and your organization need to do to protect your cloud assets. You’ll learn how to keep track of a diverse array of components and applications, check authentication and authorization, manage vulnerabilities at all levels, and control network access. You’ll examine how to go about doing this with today’s popular cloud providers. Each cloud provider and application is different, and no set of preventative controls can be the perfect one-size-fits-all answer to these threats, so you’ll also learn how to watch for and recognize problems and more effectively respond to them when they do arise. When you’ve completed this video course, you’ll know the basics of cloud security as well as the right questions to ask to protect and defend your specific environments.
What you’ll learn—and how you can apply it
- How security responsibility is shared in the cloud between the provider and the consumer
- Different methods for protecting your data in the cloud, such as classification, encryption, and tokenization
- How to keep track of the many different types of cloud assets you might have, such as virtual machines, storage volumes, and more
- How to track identities and manage access
- How to manage vulnerabilities at all layers of the stack, from software you write to third-party libraries
- How to keep your networks secure using a perimeter and internal segmentation model
- How to see when something is going wrong and respond to it
This video course is for you because…
- You're an IT architect or developer moving to the cloud
- You're an IT security professional tasked with keeping your teams safe in the cloud
Prerequisites:
- General knowledge of computing concepts, such as storage and virtual machines
- General knowledge of networking, including IP addresses, subnetting, and firewalls
- If you’re new to IT architecture or IT security, you might need some additional introductory courses prior to this one
Materials or downloads needed in advance:
Further resources
- Threat Modeling: Designing for Security, by Adam Shostack is a very good read for anyone who wants more in-depth information on threat modeling
- Applied Cryptography by Bruce Schneier is the definitive reference for anyone who would like to dig deep into cryptography
- The online documentation for the different cloud providers is the best, most up-to-date resource for determining how to do exactly what you want to do with that provider; this course teaches you to ask the right questions, but in most cases it doesn’t give step-by-step instructions on how to do it, because those would quickly become obsolete
Table of Contents
Introduction
Module 1: Principles and Concepts
Module 1 Introduction
Dealing with Vulnerabilities, Threats, and Risks
Using Strategic Threat Intelligence
Understanding Least Privilege
Understanding Defense in Depth
Understanding the Shared Responsibility Model
Module 1 Summary
Module 2: Data Asset Management and Protection
Module 2 Introduction
Data Classification and Tagging
Protecting Data with Tokenization and De-identification
Protecting Data with Encryption
Module 2 Summary
Module 3: Cloud Asset Management
Module 3 Introduction
Understanding Cloud Assets
Tagging Cloud Assets
Building an Asset Management Pipeline
Module 3 Summary
Checkpoint
Checkpoint
Module 4: Identity and Access Management
Module 4 Introduction
The IAM Life Cycle and Emergency Access
Authentication: Cloud Identity Services
Authentication: Federation and Single Sign On
Authentication: Passwords, API keys, MFA, Shared IDs, Identity Documents
Secrets Management
Authorization
Practicing IAM with a Sample Application
Module 4 Summary
Module 5: Vulnerability Management
Module 5 Introduction
Looking at the Stack
Shifting Left and Automatically Updating
Finding and Prioritizing Vulnerabilities
Practicing Vulnerability Management with a Sample Application
Module 5 Summary
Module 6: Network Security
Module 6 Introduction
What Are All These Network Controls?
Encryption in Motion
Administrative Access
Practicing Network Controls with a Sample Application
Module 6 Summary
Module 7: Detecting, Responding to, and Recovering from Incidents
Module 7 Introduction
What to Watch
How to Watch
Preparing for an Incident
Responding to and Recovering from an Incident
Practicing Detection and Response with a Sample Application
Module 7 Summary
Learning Path Conclusion
Conclusion