Basics of Cloud Security

How do you keep your private data safe in the public cloud? Is it even possible? In fact, your data and your application is likely safer in the public cloud than in your own private data center. This course will show you, at a high level, the guiding principles and policies you need to understand to keep your cloud-based and cloud-native application safe and secure.

This course is designed for technical executives, managers, and leaders that want to understand, at a high level, how to build a safe and secure cloud application. It’s also for cloud architects and senior developers that want to understand how to communicate basic cloud security principles to your company’s executives and leaders.

Available exclusively at Atchison Academy.

What You Will Learn in this Course

  • Understanding authentication and authorization in cloud-based applications.
  • Two-person access and other Least Privilege processes
  • How Separation of Duties helps keep your cloud-based application safe
  • Just-in-Time Permissions
  • Securing data at rest and in transit
  • Using isolation zones and zero trust
  • Security and the Citizen Developer

This course is a high-level course giving you a summary of these and related topics in an easy-to-consume format. Read one email a day, and in two weeks, you'll have a fundamental understanding of some of the most critical cloud-native security concepts, so when your CSO and other security experts talk to you about why we need  two-person access processes to keep production secure, you'll understand what they are talking about and why it's important.

Whether you are an executive looking for a quick introduction, or a software engineer new to the concepts of cloud security, this course is for you.

And, for a limited time, this course is available for the introductory price of $79! Be an early learner, and check it out before the price goes up!

About this course

$79

15 lessons

Course content

  • Authentication
  • Authorization
  • What's the difference between Authentication and Authorization?
  • Principle of Shared Responsibility
  • Principle of Least Privilege
  • Principle of Separation of Duties
  • Just-in-Time Permissions
  • Securing Data at Rest
  • Securing Data in Transit
  • Isolation Zones
  • Keeping microservices secure, even from themselves (Zero Trust)
  • Security and the Citizen Developer

Operate your sensitive applications in the public cloud.

How do you keep your private data safe in the public cloud? This email course will show you, at a high level, the guiding principles and policies you need to understand in order to keep your cloud-based and cloud-native application safe and secure.