π Folder Tree
- π Security by Design Thinking for Cloud Architects
- π CHAPTER 01 Introduction
- π 01-01 Course Introduction
- π 01-02 Getting Started
- π CHAPTER 02 Cloud Architecture and Governance
- π 02-01 Cloud Architecture and Governance Introduction
- π 02-02 Cloud Models
- π 02-03 Deployment Models and Cloud Architecture
- π 02-04 Governance
- π 02-05 Data and Privacy
- π 02-06 Cloud Architecture and Governance Summary
- π CHAPTER 03 Cloud Monitoring, Identity, and Access
- π 03-01 Cloud Monitoring, Identity, and Access Introduction
- π 03-02 Cloud Monitoring
- π 03-03 Cloud Identity
- π 03-04 Cloud Access
- π 03-05 Cloud Monitoring, Identity, and Access Summary
- π 03-06 HANDS-ON LAB Create and Manage Microsoft Entra ID Users in the Portal
- π CHAPTER 04 Cloud Infrastructure Security
- π 04-01 Cloud Infrastructure Security Introduction
- π 04-02 Cloud Network and Traffic Security
- π 04-03 Cloud Compute Security
- π 04-04 Container and Serverless Security
- π 04-05 Cloud Infrastructure Security Summary
- π 04-06 HANDS-ON LAB Configuring NACLs Using AWS
- π CHAPTER 05 Cloud Storage and Database Security
- π 05-01 Cloud Storage and Database Security Introduction
- π 05-02 Cloud Storage Security
- π 05-03 Cloud Database Security
- π 05-04 Key Management
- π 05-05 Cloud Storage and Database Security Summary
- π 05-06 HANDS-ON LAB Handling Encryption Keys with Cloud KMS
- π CHAPTER 06 Cloud Applications and API Security
- π 06-01 Cloud Applications and API Security Introduction
- π 06-02 Cloud Software Development Security
- π 06-03 Cloud Application Security
- π 06-04 Cloud API Security
- π 06-05 Cloud Applications and API Security Summary
- π 06-06 HANDS-ON LAB Configuring WAF Rules Using Cloud Armor
- π CHAPTER 07 Conclusion
- π 07-01 Course Summary
- π 07-02 Conclusion and WhatΓ’β¬β’s Next