Aspire Network Security Specialist to CloudOps Security Architect CloudOps Security Architect Track 4: Cloud Security Architect
Final Exam: Cloud Security Architect will test your knowledge and application of the topics presented throughout the Cloud Security Architect track of the Aspire Network Security Specialist to CloudOps Security Architect Journey.
| Objectives |
Final Exam: Cloud Security Architect - apply and configure NSGs in VNets
- apply cloud hardware security module in GCP
- configure hardware security module in Azure
- configure secure VPC in GCP
- configure VPC on AWS
- define IAM methodologies in cloud
- define security groups and subnet concepts in Azure
- define the rules and standards with respect to the cloud security provider
- describe Azure Key Vaults
- describe functions of VPC
- describe how does monitoring work in a cloud infrastructure
- describe how IAM works on Azure
- describe how to recover data using ASR
- describe how to recover data using CDM
- describe how VM Placement Algorithm works
- describe responsibility model to achieve the compliance
- describe the applications of ACL in Azure
- describe the functions of the advisor tool
- describe the methodology to implement preventing mechanism using VM replacement algorithm
- describe the policies and ways to meet compliance
- describe the process of configuring IAM in Azure
- describe the process that Google uses to setup their security using cloud infrastructure
- describe the ways to react to vulnerabilities in Azure
- describe the ways to react to vulnerabilities in GCP
- describe why due diligence is required to complete the audits successfully
- distinguish between KMS and Cryptographic Key
- identify how to secure cloud storage using ACL in GCP
- identify how to secure your cloud deployments
- identify responsibility model to achieve the compliance
- identify the common risks in security infrastructure
- identify the features of GCP cloud in GCP
- identify the service controls in GCP
- identify the specific tools within Google cloud
- identify the ways on how to prevent vulnerabilities in Azure proactively
- identify the ways on how to prevent vulnerabilities in GCP proactively
- identify the ways to react to vulnerabilities in GCP
- Identify the zones and regions specific to AWS and GCP
- identify ways how to secure content using cloud infrastructure
- identify ways to perform monitoring in GCP
- list the common techniques around tackling threats
- list the groups and permissions in GCP/Azure
- list the methods to implement ACLs in GCP and AWS
- list the specific tools within Azure cloud
- list the specific tools within Google cloud
- list the various methods to detect vulnerabilities in Azure
- list the ways to control the access on cloud infrastructure network
- recall how to recover data using CDM
- recall the service used by VPCs including Private Link, secure endpoints, and Direct Connect
- recall understanding the built SIEM system in Azure
- recognize how to recover data using CDM
- recognize the features of responsibility model in Azure
- recognize the methodology to implement preventing mechanism using VM replacement algorithm
- recognize the security flaws within a cloud infrastructure
- recognize the ways to react to vulnerabilities in GCP
- recognize why due diligence is required to complete the audits successfully
- specify access and segregation of the access by roles
- specify the security levels of cloud infrastructure
- use ACLs to provide custom access
- use Azure active directory to perform configurations
- use hardware encryption to secure hardware data
|