Curriculum Designed by Experts
Configuring Cloud Identity. Considerations include:
Managing service accounts. Considerations include:
Managing authentication. Considerations include:
Managing and implementing authorization controls. Considerations include:
Defining resource hierarchy. Considerations include:
Designing network security. Considerations include:
Configuring network segmentation. Considerations include:
Establishing private connectivity. Considerations include:
Protecting sensitive data. Considerations include:
Managing encryption at rest. Considerations include:
Building and deploying secure infrastructure and applications. Considerations include:
Configuring logging, monitoring, and detection. Considerations include:
Determining regulatory requirements for the cloud. Considerations include: