In the last decade, the nature and complexity of security attacks have increased tremendously. From simple attacks, which focused on hacking exposed web pages, we have evolved to stealthy attacks, which focus on the hacker staying hidden for years on end inside the victim’s network with the sole purpose of stealing data.
This lesson provides you with an overview of operations security and how you can use it to mitigate the risks facing cloud-based infrastructure.
If you have any feedback relating to this Lesson, feel free to reach out to us at support@cloudacademy.com.
To get the most out of this Lesson, you should already have a good understanding of cloud infrastructure and operations. Basic knowledge of IT security would also be beneficial.