CompTIA Cloud+ CV0-001: Cloud Security New Horizons Lebanon
Price: TBA
  • Duration: 2 Hours

Course details

  • It is important to understand the different security mechanisms that can be implemented to ensure unwanted users cannot access the cloud infrastructure. This course will describe network security concepts and how to secure information using encryption, access control, and system hardening. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
  • start the course
  • describe how and where network ACLs are used to manage access to network resources
  • describe the different types of VPNs, how they are established, and the differences between them
  • describe the characteristics of IDS/IPS devices and network firewalls
  • describe how and why a DMZ is implemented
  • describe how and why network auditing is carried out, and the information that can be obtained
  • describe the tools and techniques commonly used to attack networks, including DDoS, ping of death, and ping flooding
  • describe how data storage systems can use obfuscation to make sensitive information, such as password data, unreadable to humans
  • describe how and where file system ACLs are used to manage access to file resources
  • describe the role of zoning and LUN masking in SAN security
  • describe the main authentication methods and protocols, and how and where they are used
  • describe how and why file system auditing is carried out, and the information that can be obtained
  • describe the processes and components of PKI, and how certificates are used
  • describe the components, processes, and reasons for deploying IPsec
  • describe how and where SSL/TLS are used, and the process of securing communication
  • recognize the main encryption protocols and their features including AES, 3DES, RSA, DSA, RC4, and RC5
  • describe how the various encryption technologies are used to encrypt data in transit and data at rest
  • describe how and where RBAC is used, the concept of role-based security, and the principle of least privilege
  • describe the difference between DAC and MAC and where each might be applied
  • describe what constitutes a security factor, where multifactor authentication is used, and why
  • describe how organizations can be federated to provide mutual access, and how SSO can provide authentication across platforms without requiring multiple logins
  • describe how organizations can be federated to provide mutual access, a
Updated on 08 November, 2015

About New Horizons Lebanon

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.

See all New Horizons Lebanon courses
Courses you can instantly connect with... Do an online course on CompTIA starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or