We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Course 6: Cloud and Wireless Security

Read more

Course 6: Cloud and Wireless Security

Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both transformations are complex topics. However, as a security practitioner, we can narrow these two topics by applying the security fundamentals to secure the data. This boils down to the three basics of protecting data at rest, in motion, and in use. The data is either on the endpoint devices, servers, or other endpoints, making these services a reality.

Course 6 Learning Objectives

After completing this course, the participant will be able to: 

L6.1 - Recall cloud security concepts and configurations.

L6.2 - Recognize types of virtualization and cloud security considerations.

L6.3 - Summarize the types of telecommunications and network access controls.

Course Agenda

Module 1: Operate and Configure Cloud Security (Domain 7 - Systems and Application Security)

Module 2: Cloud Security Considerations (Domain 6 - Network and Communications Security)

Module 3: Secure Wireless Configurations (Domain 6 - Network and Communications Security)

Who Should Take This Course: Beginners

Experience Required: No prior experience required

Enroll now

What's inside

Syllabus

Module 1: Operate and Configure Cloud Security
We have all seen the extraordinary growth in the area of cloud computing fueled, at least in part, by the advances in virtualization and storage technologies. Cloud computing offers subscribers almost unlimited possibilities, but it also presents some formidable challenges regarding information security. The security professional must have a thorough knowledge of cloud concepts and the security implications of outsourced IT in general. Let’s begin by examining the essential characteristics. 
Read more
Module 2: Cloud Security Considerations
It’s time to take a closer look at virtualization and how it is both the strength and the attractive nuisance or “threat magnet” aspect of hosting an organization’s business processes and data in the cloud. We know why we have to protect information assets no matter where they are hosted, how they are in motion, or how they are being used. As to how, almost every week the specific details change for each cloud services provider not only as they add new features and capabilities but also because they respond to new vulnerabilities and attack attempts.  Instead, this module will concentrate more on what to protect. 
Module 3: Secure Wireless Configurations
In this module, we discuss how the many different digital, analog and other technologies common to our personal and professional lives have converged or come together in nearly seamless ways. This convergence of technologies has shifted the way we work and communicate with others. It’s almost easier to make a list of technologies that are not part of this converged communication than it is to include them all. We won’t try to cover them all here in module 3. TCP/IP and the OSI 7-Layer protocol stacks have already been covered, as have many of the basic software technologies. We’ve also looked at access control as a fundamental need when allowing mobile devices to connect to those IP networks regardless of the physical layer they use to start that connection process with.  In that sense, this module looks further at the ways things work at layers 2 and above in those protocol stacks. We’ll focus on security needs that the various systems require and highlight some key issues along the way.  Doing so will help us put voice over IP (VoIP) and other converged communications systems and their use cases into a security context. 
Module 4: Chapter 6 Review
Information systems and assets that have been fully or partially migrated into a cloud hosted environment is a straightforward process, as we’ve seen in this chapter. Straightforward, yes, but a process that requires significant specialist knowledge and skill regarding the cloud services providers’ architecture, systems, and security tools. Central to securing a cloud-hosted system is the virtualization that makes it work. As you gain experience with cloud systems security, you’ll need to strengthen your own working knowledge of virtual systems and how to secure, manage, deploy and monitor them. It may seem to be a large mental shift to move away from tangible hardware devices that you physically configure to using GUIs and scripts to configure virtual devices — simulations of routers and firewalls running as software-only entities — but in reality, most security professionals and many network engineers spend much of their effort using scripts and GUIs to manage their existing physical IT and OT infrastructures.  The continued convergence of communications brings our security thinking to a different perspective on cloud security, when we accept that many of these new people-facing services, such as full-function collaboration suites, are cloud native to begin with. This also guides us to plan for and include in the organization’s overall IT and OT architectures the many different types of communications technologies and systems being used.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores the convergence of communication technologies and the shift in work and communication styles
Examines cloud computing's growth and its implications for information security
Teaches the fundamentals of cloud security, including data protection at rest, in motion, and in use
Provides an overview of virtualization and its role in cloud security
Suitable for beginners with no prior experience in cloud or wireless security
Lacks hands-on labs or interactive materials for practical application of concepts

Save this course

Save Cloud and Wireless Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cloud and Wireless Security with these activities:
Review Cloud Concepts
Refreshes foundational knowledge in cloud computing concepts and security implications, preparing you for the course content.
Browse courses on Cloud Computing
Show steps
  • Review text materials on cloud computing architectures and security.
  • Summarize key concepts related to cloud security, such as shared responsibility model and data protection.
  • Explore relevant online resources and articles to enhance your understanding.
Volunteer at a Cybersecurity Event
Immerses you in the field, expands your network, and provides hands-on experience in cloud security.
Browse courses on Cloud Security
Show steps
  • Identify cybersecurity conferences or events in your area.
  • Contact the organizers and express your interest in volunteering.
  • Participate in activities such as registration, speaker support, or security demonstrations.
Virtualization and Cloud Security
Provides hands-on practice in understanding the security implications of virtualization and cloud computing.
Browse courses on Virtualization
Show steps
  • Follow guided tutorials on configuring and securing virtual machines.
  • Analyze security risks associated with various virtualization technologies.
  • Implement security measures to protect cloud environments from malicious actors.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Practice exercises on cloud security concepts
Helps solidify understanding of cloud security concepts and their application in real-world scenarios.
Show steps
  • Find practice questions or exercises online or in textbooks.
  • Set a timer and attempt to answer the questions or complete the exercises within the time limit.
  • Review the solutions and identify areas for improvement.
Network Access Control Drills
Reinforces understanding of network access control mechanisms through practical exercises.
Browse courses on network security
Show steps
  • Configure and test network access control lists (NACLs) in a cloud environment.
  • Analyze network traffic logs to identify and mitigate security threats.
  • Practice deploying and managing network security appliances in a cloud setting.
Cloud Security CTF
Tests your cloud security skills in a competitive environment and exposes you to real-world security challenges.
Browse courses on Cloud Security
Show steps
  • Register for a cloud security capture the flag (CTF) competition.
  • Analyze provided cloud infrastructure and identify security vulnerabilities.
  • Develop solutions to exploit the vulnerabilities and secure the infrastructure.
Cloud Security: A Comprehensive Guide
Provides a comprehensive overview of cloud security principles and best practices, expanding your knowledge beyond the course content.
Show steps
  • Read chapters covering fundamental cloud security concepts and technologies.
  • Summarize key cloud security challenges and solutions discussed in the book.
  • Analyze case studies to understand real-world cloud security incidents.
Security Whitepaper on Cloud Migration
Encourages you to synthesize your knowledge and share your insights on cloud security best practices.
Browse courses on Cloud Security
Show steps
  • Research best practices for cloud migration and data protection.
  • Develop a whitepaper outlining the key considerations and recommendations for secure cloud migration.
  • Share your whitepaper with industry professionals or publish it online.
Cloud Security Project
Provides a practical platform to apply your cloud security knowledge and skills to a real-world scenario.
Browse courses on Cloud Security
Show steps
  • Design and deploy a cloud infrastructure for a specific application or service.
  • Implement security measures to protect the cloud environment from threats.
  • Monitor and maintain the security of the cloud infrastructure over time.

Career center

Learners who complete Cloud and Wireless Security will develop knowledge and skills that may be useful to these careers:
Cloud Engineer
A Cloud Engineer designs and implements cloud solutions for organizations. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Cloud Engineers, as it provides a comprehensive overview of cloud security concepts and best practices.
Cloud Security Architect
A Cloud Security Architect designs and implements security architectures for cloud environments. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Cloud Security Architects, as it provides a comprehensive overview of cloud security concepts and best practices.
Cybersecurity Manager
A Cybersecurity Manager leads and manages an organization's cybersecurity program. They develop and implement security policies, assess and mitigate risks, and ensure compliance. This course may be useful for aspiring Cybersecurity Managers, as it provides a comprehensive overview of cybersecurity concepts and best practices, including cloud security.
Incident Responder
An Incident Responder investigates and responds to security incidents. They work to contain and mitigate damage, and to restore normal operations. This course may be useful for aspiring Incident Responders, as it provides an overview of incident response concepts and best practices, including cloud security.
IT Security Manager
An IT Security Manager leads and manages an organization's IT security program. They develop and implement security policies, assess and mitigate risks, and ensure compliance. This course may be useful for aspiring IT Security Managers, as it provides a comprehensive overview of IT security concepts and best practices, including cloud security.
Cloud Solutions Architect
A Cloud Solutions Architect designs and implements cloud solutions for organizations. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Cloud Solutions Architects, as it provides a comprehensive overview of cloud security concepts and best practices.
Security Manager
A Security Manager leads and manages an organization's security program. They develop and implement security policies, assess and mitigate risks, and ensure compliance. This course may be useful for aspiring Security Managers, as it provides a comprehensive overview of security management concepts and best practices, including cloud security.
Cloud Security Analyst
A Cloud Security Analyst designs, deploys, and maintains cloud security architectures. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Cloud Security Analysts, as it provides a comprehensive overview of cloud security concepts, configurations, considerations, and best practices.
Security Engineer
A Security Engineer designs and implements security solutions for organizations. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Security Engineers, as it provides a comprehensive overview of security engineering concepts and best practices, including cloud security.
Network Security Engineer
A Network Security Engineer designs, deploys, and maintains network security architectures. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Network Security Engineers, as it provides a comprehensive overview of network security concepts and best practices, including cloud security.
Security Consultant
A Security Consultant provides security advice and guidance to organizations. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Security Consultants, as it provides a comprehensive overview of security concepts and best practices, including cloud security.
Security Architect
A Security Architect designs and implements security architectures for organizations. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Security Architects, as it provides a comprehensive overview of security architecture concepts and best practices, including cloud security.
Wireless Network Engineer
A Wireless Network Engineer designs, deploys, and maintains wireless networks. They assess and mitigate risks, develop security policies, and ensure compliance. This course may be useful for aspiring Wireless Network Engineers, as it provides a comprehensive overview of wireless network security concepts and best practices, including cloud security.
Information Security Analyst
An Information Security Analyst protects an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for aspiring Information Security Analysts, as it provides a comprehensive overview of information security concepts and best practices, including cloud security.
Systems Administrator
A Systems Administrator manages and maintains an organization's computer systems and networks. They install and configure software, monitor system performance, and troubleshoot problems. This course may be useful for aspiring Systems Administrators, as it provides a comprehensive overview of systems administration concepts and best practices, including cloud security.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cloud and Wireless Security.
Provides a detailed overview of 802.11 wireless networks, covering topics such as wireless network architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about 802.11 wireless networks.
Provides a detailed overview of telecommunications and network access controls, covering topics such as telecommunications and network architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about telecommunications and network access controls.
Provides a detailed overview of wireless and mobile network security, covering topics such as wireless and mobile network architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about wireless and mobile network security.
Provides a comprehensive overview of telecommunications security, covering topics such as telecommunications and network architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about telecommunications security.
Provides a detailed overview of cryptography and network security, covering topics such as cryptography, network security protocols, and security controls. It valuable resource for anyone looking to learn more about cryptography and network security.
Provides a practical guide to cloud computing security and privacy, covering topics such as cloud architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about cloud computing security and privacy.
Provides a guide to secure Wi-Fi networks, covering topics such as Wi-Fi network architecture, security risks and threats, and security controls. It valuable resource for anyone looking to learn more about securing Wi-Fi networks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cloud and Wireless Security.
Networks and Communications Security
Most relevant
CompTIA Network+ (N10-007) Full Course & Practice Exam
Most relevant
5G for Everyone
Most relevant
IoT (Internet of Things) Wireless & Cloud Computing...
Most relevant
Automating Cisco Security Management Solutions Using APIs
Most relevant
Computer Networking
Most relevant
Introduction to Computer Security
Configuring Microsoft Azure Data Infrastructure Security
IoT Communications and Networks
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser