Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Cloud Security Architecture Blueprint: From Log Analyst to Architect

Автор: Prabh Nair

Загружено: 2025-07-12

Просмотров: 4361

Описание:

Learn how to go from SOC log analyst to cloud-security architect—step by step. In this hands-on masterclass, Kushal Kumar (Security Architect, GoDaddy) shares hard-won lessons on designing secure AWS/Azure environments, avoiding common misconfigurations, and translating tech risk into business value.

00:00 – 00:48 - Precap (Summary of previous podcast)
00:48 – 01:37 - Start of conversation by welcoming guest
01:37 - 03:04 - Introduction of Kushal and his hard work and career
03:04 - 06:22 - Step-by-step journey process to become an architect
06:22 - 15:06 - Become an architect from zero step by step
15:06 - 16:26 - Tools used to design programs
16:26 - 19:40 - Important characteristics
19:40 - 22:00 - Architecture decisions
22:00 - 25:15 - Secrets
25:15 - 29:23 - Secret management pattern
29:23 - 31:36 - Design principle keeping secrets
31:36 - 33:40 - Logging strategy
33:40 - 36:06 - Log Sources
36:06 - 37:40 - Cost effective log storage
37:40 - 39:40 - Temperproof
39:40 - 43:28 - First red flag you look for the vendor cloud architecture
43:28 - 45:50 - Findings of architecture into the GRC
45:50 - 48:33 - Checklist
48:33 - 50:03 - End of the conversation with Vote of Thanks and future podcast
50:03 - Share Opinions

What You’ll Learn
The exact skills Kushal used to jump from log analysis to cloud security architecture
Top 5 cloud mistakes to avoid (open S3 buckets, missing CloudTrail, static keys…)
A 3-log starter kit (CloudTrail, VPC Flow Logs, AWS Config / Azure Policy)
Secrets management on a budget—choosing vaults, IAM roles, and pre-commit hooks
How to translate architecture findings into non-tech language for the board
Quick checklist: IAM ✔︎ DDoS ✔︎ Data encryption ✔︎ Logging & monitoring ✔︎
First red flags in vendor risk reviews (SOC 2, encryption, audit evidence)

Linkedin Profile
  / kuskumar  
CISO talks
   • CISO Master Class  

NIST Series
   • NIST CSF - Identify Function ((Asset Manag...  
GRC Series
   • GRC Practical Approach - Part 1: Introduction  


ISO 27001 Video
   • Implementing ISO 27001 in an organization ...  

ISO 27001 Implementation Guide
   • ISO 27001 Like Never Seen Before: A Comple...  

GRC Practical Series
   • GRC Practical Series  

GRC Interview
   • GRC  

Internal Audit
   • Internal Audit  

Study with Me
Telegram Group
https://t.me/Prabhstudy


#architecture #architect #cloudsecurity #cloudarchitect #cybersecurity

Cloud Security Architecture Blueprint: From Log Analyst to Architect

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(0) { }

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]