


This checkpoint will focus on securing your server. You can set up effective security measures for both the cloud server itself and your web applications. Securing your server is critical for protecting your users and personal information. To run a cloud application efficiently, you should implement industry recommended security practices when configuring your server. You can use this checkpoint to assess your knowledge of these topics, review key terms and commands, and find resources for continued learning.

This checkpoint is intended to help you assess what you learned from our introductory articles on security, where we introduced recommended security practices and commonly used security tools.
