New Skills

New Training: Planning for and Securing Cloud Platform-as-a-Service

by Team Nuggets
New Training: Plan for Cybersecurity in the Cloud picture: A
Published on March 3, 2021

In this 9-video skill, CBT Nuggets trainer Bart Castle discusses protective, detective, and reactive controls for cloud platform-as-a-service models. Gain an understanding of containers, secure software development, Cisco Tetration, and AppDynamics for Zero Trust workload security. Watch this new Cisco training.

Watch the full course: Implementing and Operating Cisco Security Core Technologies

This training includes:

  • 9 videos

  • 1.8 hours of training

You’ll learn these topics in this skill:

  • Securing Cloud Platform-as-a-Service

  • Plan for Containers

  • Secure Container Images and Registries

  • Orchestrating Containers

  • Open Web Application Security Project Controls

  • OWASP Protective Controls Continued

  • Cisco Zero-Trust Architecture Overview

  • Securing Workloads with Cisco Tetration

  • Visibility with Cisco AppDynamics

What are Containers and Why are They Important?

Over the past decade, there has been a massive transformation in computing. Virtualization of physical servers provided an incredible benefit to organizations as it allowed for abstracting hardware resources into bifurcated virtual machines so that unique applications and services could be run next to one another without interfering with each other. This was a huge step in computing, as it allowed for a more efficient allocation of hardware resources into dedicated virtual machines.

Containers are looking to provide the next major step in computing by abstracting resources in a more effective way at the container level. Containers act as a massive pool of resources that allow critical applications to use what they need side-by-side, all working within a single container. Here, the great benefit of containers is the removal of many operating systems requiring predefined resources to house each of these applications. By removing the virtualization of each operating system that contained unique applications, organizations no only have to worry about over or under-provisioning virtual machines and can focus on ensuring that the container has proper resources to support all of the applications running side-by-side in the container.

Recommended Articles