Useful Links
Computer Science
Cloud Computing
Cloud Security
1. Foundations of Cloud Security
2. Cloud Governance and Risk Management
3. Identity and Access Management (IAM)
4. Infrastructure Security
5. Data Protection and Encryption
6. Application Security
7. Security Operations and Monitoring
8. DevSecOps and Automation
9. Emerging Technologies and Advanced Topics
Infrastructure Security
Network Security Architecture
Virtual Network Design
Virtual Private Cloud (VPC) Architecture
Network Segmentation Strategies
Subnet Design Principles
Network Isolation Techniques
Logical Isolation
Physical Isolation
Microsegmentation
Software-Defined Networking (SDN) Security
SDN Controller Security
Flow Table Protection
Network Virtualization Security
Network Access Controls
Firewall Technologies
Network Firewalls
Host-Based Firewalls
Next-Generation Firewalls (NGFW)
Network Access Control Lists
Stateless Filtering
Rule Optimization
Management Best Practices
Security Groups
Stateful Filtering
Group-Based Policies
Dynamic Rule Updates
Web Application Firewalls
Application Layer Protection
OWASP Top 10 Mitigation
Custom Rule Development
Network Monitoring and Detection
Network Traffic Analysis
Flow Monitoring
Packet Inspection
Behavioral Analysis
Intrusion Detection Systems
Signature-Based Detection
Anomaly-Based Detection
Hybrid Detection Approaches
Network Forensics
Traffic Capture
Evidence Preservation
Timeline Reconstruction
Secure Connectivity
Virtual Private Networks
Site-to-Site VPN
Remote Access VPN
VPN Protocol Selection
Dedicated Connections
Direct Connect Services
ExpressRoute Implementation
Dedicated Circuit Security
API Gateway Security
API Authentication
Rate Limiting
API Monitoring
Compute Security
Virtual Machine Security
VM Hardening
Hypervisor Security
VM Isolation
Container Security
Container Image Security
Runtime Protection
Orchestration Security
Serverless Security
Function Security
Event Source Security
Cold Start Security
Previous
3. Identity and Access Management (IAM)
Go to top
Next
5. Data Protection and Encryption