UsefulLinks
Computer Science
Cloud Computing
Cloud Security
1. Foundations of Cloud Security
2. Cloud Governance and Risk Management
3. Identity and Access Management (IAM)
4. Infrastructure Security
5. Data Protection and Encryption
6. Application Security
7. Security Operations and Monitoring
8. DevSecOps and Automation
9. Emerging Technologies and Advanced Topics
4.
Infrastructure Security
4.1.
Network Security Architecture
4.1.1.
Virtual Network Design
4.1.1.1.
Virtual Private Cloud (VPC) Architecture
4.1.1.2.
Network Segmentation Strategies
4.1.1.3.
Subnet Design Principles
4.1.2.
Network Isolation Techniques
4.1.2.1.
Logical Isolation
4.1.2.2.
Physical Isolation
4.1.2.3.
Microsegmentation
4.1.3.
Software-Defined Networking (SDN) Security
4.1.3.1.
SDN Controller Security
4.1.3.2.
Flow Table Protection
4.1.3.3.
Network Virtualization Security
4.2.
Network Access Controls
4.2.1.
Firewall Technologies
4.2.1.1.
Network Firewalls
4.2.1.2.
Host-Based Firewalls
4.2.1.3.
Next-Generation Firewalls (NGFW)
4.2.2.
Network Access Control Lists
4.2.2.1.
Stateless Filtering
4.2.2.2.
Rule Optimization
4.2.2.3.
Management Best Practices
4.2.3.
Security Groups
4.2.3.1.
Stateful Filtering
4.2.3.2.
Group-Based Policies
4.2.3.3.
Dynamic Rule Updates
4.2.4.
Web Application Firewalls
4.2.4.1.
Application Layer Protection
4.2.4.2.
OWASP Top 10 Mitigation
4.2.4.3.
Custom Rule Development
4.3.
Network Monitoring and Detection
4.3.1.
Network Traffic Analysis
4.3.1.1.
Flow Monitoring
4.3.1.2.
Packet Inspection
4.3.1.3.
Behavioral Analysis
4.3.2.
Intrusion Detection Systems
4.3.2.1.
Signature-Based Detection
4.3.2.2.
Anomaly-Based Detection
4.3.2.3.
Hybrid Detection Approaches
4.3.3.
Network Forensics
4.3.3.1.
Traffic Capture
4.3.3.2.
Evidence Preservation
4.3.3.3.
Timeline Reconstruction
4.4.
Secure Connectivity
4.4.1.
Virtual Private Networks
4.4.1.1.
Site-to-Site VPN
4.4.1.2.
Remote Access VPN
4.4.1.3.
VPN Protocol Selection
4.4.2.
Dedicated Connections
4.4.2.1.
Direct Connect Services
4.4.2.2.
ExpressRoute Implementation
4.4.2.3.
Dedicated Circuit Security
4.4.3.
API Gateway Security
4.4.3.1.
API Authentication
4.4.3.2.
Rate Limiting
4.4.3.3.
API Monitoring
4.5.
Compute Security
4.5.1.
Virtual Machine Security
4.5.1.1.
VM Hardening
4.5.1.2.
Hypervisor Security
4.5.1.3.
VM Isolation
4.5.2.
Container Security
4.5.2.1.
Container Image Security
4.5.2.2.
Runtime Protection
4.5.2.3.
Orchestration Security
4.5.3.
Serverless Security
4.5.3.1.
Function Security
4.5.3.2.
Event Source Security
4.5.3.3.
Cold Start Security
Previous
3. Identity and Access Management (IAM)
Go to top
Next
5. Data Protection and Encryption