Monitoring and Managing Security Threats on IBM Cloud – c110024gwpl
Course #: c110024gwpl
Duration: 0.8 Hours
This module provides an overview of monitoring and managing security threats on IBM Cloud. The module explores two IBM Cloud deployment models and the features and benefits to expect within each environment. Finally, this module discusses the various security options that are available in IBM Cloud and how to apply code patterns to a solution.
Objectives
- Identify cloud deployment models and understand the security incident response management
- Apply monitoring, security insights and incident response code patterns
- Review Security Reference Architecture's security monitoring and intelligence options
Audience
This course is intended for learners who are pursuing professional-level site reliability engineer certification on IBM Cloud.
Prerequisites
Before starting this curriculum, the target audience should understand:
•System Thinking
•DevOps practices
•Cloud Architecture
•Software engineering principles
•System administration
•Network and OSI model
•Networking and security practices for IBM Cloud
•Incident management
•Root cause analysis
The target audience should also be able to:
•Proficiently write code
•Create run books as a reference
•Make system components serviceable
•Interpret data and statistics to determine actions
•Use LogDNA, SysDig, Grafana, Prometheus, Kibana
•Interpret schematics
•Drive incidents to resolution
•Remediate underlying sources of unreliability
•Create and configure VMs
•Create and configure Containers on IBM Kubernetes Service (IKS)/Red Hat OpenShift Kubernetes Services (ROKS)
•Create and configure Containers using OpenShift
•Create and configure Serverless applications
•Configure for high availability and scalability
Topics
Module Introduction
Topic 1: Cloud Deployment Models and How They Impact Security Incident Response Management
Topic 2: Security Reference Architecture's Security Monitoring and Intelligence Options
Topic 3: Code Patterns
Module Summary