Learn your way! Get started

CompTIA Cloud+, Part 7 of 8: Security in the Cloud

with expert Patrick Loner

Watch trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 7/27/2017
Level Beginner
Runtime 1h 28m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included

Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More

Course description

Learn about implementing security in cloud computing models by examining the best practices for network security and how to utilize them to secure data and resources, both on-premise as well as in the cloud. This includes the need to assess and audit the network, using established frameworks, using a layered security approach, and more. Discover concepts of data security and how to use simple forms including authentication and authorization to determine resource access authorizations, and examine security mechanisms to ensure data confidentiality through encryption and data integrity using digital signatures. Finally, take a look at concepts including single sign-on and multi-factor authentication to help you better understand data security in various environments, as well as various access control methods utilized in cloud computing environments to maintain data security.


This course assumes you are familiar with the basic concepts of cloud computing, either from completing CompTIA Cloud+ Parts 1-6 or through outside study.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Cloud+

Meet the expert

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Course outline

Security and Controls

Best Practices For Network Security (33:47)
  • Introduction (01:05)
  • Bests Practices for Network Security (02:47)
  • Assess and Audit the Network (02:29)
  • Established Industry Frameworks (01:59)
  • Layered Security Approach (02:34)
  • DMZ (03:26)
  • Third Party Audits (01:23)
  • Host and Guest Hardening (01:54)
  • Host and Guest Hardening Concepts (08:53)
  • Penetration Testing (01:18)
  • Vulnerability Assessment (00:42)
  • Storage Resources (04:02)
  • Summary (01:08)
Understanding Data Security (35:24)
  • Introduction (00:50)
  • Understanding Data Security (03:37)
  • Additional Mechanisms (01:22)
  • Public Key Infrastructure (05:09)
  • Encryption Concepts (02:28)
  • Symmetric Encryption (02:11)
  • Asymmetric Encryption (02:33)
  • Digital Signatures (04:45)
  • Ciphers (03:33)
  • Encryption Protocols (07:52)
  • Summary (00:59)
Understanding Access Controls (19:20)
  • Introduction (00:49)
  • Understanding Access Controls (00:59)
  • Role Based Access Control (02:31)
  • Mandatory Access Control (01:53)
  • Discretionary Access Control (01:40)
  • Multifactor Authentication (03:24)
  • Single Sign On (SSO) (02:16)
  • Federation (04:27)
  • Summary (01:17)