New Training: Cloud and Specialized Technology Vulnerabilities
In this 4-video skill, CBT Nuggets trainer John Munjoma covers the vulnerabilities associated with operating in the cloud and operating specialized technologies. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
- 4 videos
- 27 minutes of training
You’ll learn these topics in this skill:
- Cloud Threats and Vulnerabilities
- Specialized Technology Threats and Vulnerabilities
- Cloud Service And Deployment Models
- Securing Specialized Technologies
How Safe is The Public Cloud?
Often organizations make over-generalizations around public cloud infrastructure. Some organizations assume the public cloud is inherently safe without prudent deployment and care, and other organizations assume that the cloud is inherently vulnerable to cyberattacks. The truth is, the public cloud is as safe as the security measure and precautionary measures an organization adopts to protect its public cloud environment.
As organizations may be familiar with, the public cloud allows for many security measures and precautions that benefit organizations. By enabling cloud-based parameter security, and compliance policies, organizations can replicate the same security protocols they benefit from in an on-premises architecture, now just in their cloud environment. To build on this, the public cloud can actually offer security enhancements that on-premises organizations lack, such as cloud-based centralized key management, on-demand immutable storage, and secure data warehousing.
The important takeaway for any new organization considering moving to the cloud is that the cloud is as secure as you'd like to make it, based on your unique security policies and strategies enabled in your cloud-native environment.