Cloud Data, Platform and Applications Security (Video Course)
- By Michael J. Shannon
- Published Aug 14, 2025 by Cisco Press.
Online Video
- Your Price: $159.99
- List Price: $199.99
- About this video
Video accessible from your Account page after purchase.
- Copyright 2026
- Edition: 1st
- Online Video
- ISBN-10: 0-13-557425-0
- ISBN-13: 978-0-13-557425-6
6+ Hours of Video Instruction
Master end-to-end cloud security by learning how to protect data, secure cloud platforms, and safeguard applications with industry-leading cloud security frameworks and best practices.
This comprehensive cloud security course provides expert training to protect every layer of the cloud environment. You will learn how to secure cloud data throughout its entire lifecycle--from creation and storage to usage, sharing, archiving, and destruction. Gain practical skills in data classification, data obfuscation, and key and certificate management to enforce strong data security policies and maintain compliance.
You will explore cloud platform and infrastructure security, including designing secure physical data centers, network architectures, virtualization, cloud compute and storage components, and management planes. Learn to identify vulnerabilities, mitigate risks, and develop effective business continuity and disaster recovery plans to ensure resilient cloud operations.
The course also covers essential cloud application security topics such as secure software development lifecycles (SDLC), threat modeling, OWASP API security, secure coding techniques, and managing third-party software risks. You will master cloud identity and access management (IAM) solutions such as federated identity, single sign-on (SSO), multifactor authentication (MFA), cloud access security brokers (CASBs), and secrets management to safeguard access and protect sensitive resources.
Learn How to:
- Secure cloud data across all lifecycle phases including creation, storage, usage, sharing, archiving, and destruction
- Classify data, apply data obfuscation, and manage keys, secrets, and certificates effectively
- Design and protect cloud platforms and infrastructure including physical data centers, network environments, virtualization, compute, and storage resources
- Identify cloud vulnerabilities, assess risks, and implement mitigation strategies to safeguard cloud environments
- Develop and execute robust business continuity and disaster recovery plans tailored for cloud infrastructures
- Apply cloud application security best practices including secure software development lifecycle (SDLC), threat modeling, secure coding, and OWASP API security
- Manage third-party software risks and enforce software assurance and validation processes
- Implement cloud identity and access management (IAM) solutions, such as federated identity, single sign-on (SSO), multi-factor authentication (MFA), and cloud access security brokers (CASBs)
- Enforce strict access controls and secrets management to protect sensitive cloud resources
Who Should Take This Course
This course is ideal for IT professionals, cloud security specialists, system administrators, cloud architects, developers, and anyone responsible for securing cloud environments. Its also perfect for those preparing for cloud security certifications or looking to deepen their understanding of cloud data protection, infrastructure security, application security, and identity management.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of Contents
Course Introduction
Lesson 1: The Cloud Data Lifecycle
Phase 1: Create
Phase 2: Store
Phase 3: Use
Phase 4: Share
Phase 5: Archive
Phase 6: Destroy
Cloud Data Flows
Lesson 2: Cloud Data Security
Concepts of Cloud Data Security
Data Obfuscation
Information Rights Management
Keys, Secrets, and Certificate Management
Data Discovery
Data Classification and Policy
Auditability, Traceability, and Accountability
Lesson 3: Cloud Infrastructure and Platform Components
Physical Cloud Environments
Network Cloud Environments
Cloud Communications
Core Cloud Compute Resources
Cloud Virtualization Resources
Core Cloud Storage Components
Management Plane Cloud Solutions
Lesson 4: Data Center Design and Risk Analysis
Secure Data Center Logical Design
Physical Data Center Design
Data Center Environmental Design
Design Resilient Environments
Cloud Infrastructure Risk Assessment
Cloud Vulnerabilities, Threats, and Attacks
Cloud Infrastructure Risk Mitigation Strategies
Lesson 5: Cloud Business Continuity Planning
Business Continuity Planning
Business Impact Analysis
Backup and Restore Policies
Disaster Recovery Planning
Disaster Recovery Plan Testing Strategies
Lesson 6: Application Security Awareness and Life Cycles
Cloud Application Architecture Elements
Cloud Development
SDLC Business Requirements and Phases
Common Software Vulnerabilities
Software Threat Modeling Methods
Secure Coding Methodologies
Software Configuration Management and Versioning
Lesson 7: Software Assurance and Validation
Functional vs. Non-functional Testing
Security Testing Methodologies
Abuse Case Testing
OWASP API Security
Supply Chain Management
Third-party Software Management
Lesson 8: Identity and Access Management Solutions
Cloud IAM Services
Federated Identity
Identity Providers
Single Sign-on
Multi-factor Authentication
Cloud Access Security Brokers
Managed Security Service Providers
Secrets Management
Summary
Next steps