Monitoring and Response

Difficulty: Intermediate
Duration: 2 minutes and 32 seconds
Students: 2,834
Rating: 4.3/5

In the last decade, the nature and complexity of security attacks have increased tremendously. From simple attacks, which focused on hacking exposed web pages, we have evolved to stealthy attacks, which focus on the hacker staying hidden for years on end inside the victim’s network with the sole purpose of stealing data.

To make matters worse, more and more companies have started to store their data in the cloud, thereby transferring part of the responsibility of securing that data to the cloud service provider. Therefore these days the cloud service is entrusted with the task of providing adequate security to the data and services that it provides to customers. While making a decision to move to the cloud, the two main metrics that enterprises look at tend to be cost and security risk. This Lesson takes a deep dive into cloud security and how to mitigate the risks facing cloud-based infrastructure.

If you have any feedback relating to this Lesson, feel free to reach out to us at support@cloudacademy.com.

Learning Objectives

  • Understand the basics of cloud security.
  • Learn about security techniques such as asset management, access control, physical security, and operations security.
  • Understand how to manage the vulnerability of your systems and applications.
  • Learn how to monitor and respond to events and security incidents.

Intended Audience

  • Solutions architects
  • Data engineers
  • Security engineers
  • Anyone who wants to learn how to secure their cloud infrastructure

Pre-requisites

To get the most out of this Lesson, you should already have a good understanding of cloud infrastructure and operations. Basic knowledge of IT security would also be beneficial.

Covered Topics