<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure-Networking on Ghafoor's Personal Blog</title><link>http://ghafoorsblog.com/tags/secure-networking/</link><description>Recent content in Secure-Networking on Ghafoor's Personal Blog</description><generator>Hugo</generator><language>en</language><managingEditor>noreply@example.com (AG Sayyed)</managingEditor><webMaster>noreply@example.com (AG Sayyed)</webMaster><copyright>Copyright © 2024-2026 AG Sayyed. All Rights Reserved.</copyright><lastBuildDate>Sat, 16 May 2026 17:25:52 +0100</lastBuildDate><atom:link href="http://ghafoorsblog.com/tags/secure-networking/index.xml" rel="self" type="application/rss+xml"/><item><title>Secure Networking in the Cloud</title><link>http://ghafoorsblog.com/courses/ibm/fullstack-content/fullstack-pcert/02-cloud-computing/03-module/005-secure-networking/</link><pubDate>Fri, 14 Mar 2025 15:45:40 +0000</pubDate><author>noreply@example.com (AG Sayyed)</author><guid>http://ghafoorsblog.com/courses/ibm/fullstack-content/fullstack-pcert/02-cloud-computing/03-module/005-secure-networking/</guid><description>&lt;p class="lead text-primary"&gt;
This document explains the different types of secure networking available in the cloud. Secure networking is crucial for protecting data and applications from cyber threats. In this document, we will discuss the different types of secure networking available in the cloud, including firewalls, intrusion detection systems (IDS), and virtual private clouds (VPCs). We will also provide examples of how to implement these secure
&lt;/p&gt;


&lt;h2 id="networking-in-cloud-vs-on-premises"&gt;Networking in Cloud vs. On-Premises&lt;/h2&gt;
&lt;p&gt;Networking in the cloud is different from on-premises networking. In the cloud, networking is virtualized, and the physical network infrastructure is abstracted from the user. Cloud providers offer networking services that allow users to create virtual networks, subnets, and security groups. Users can define routing rules, access control lists, and firewall policies to secure their cloud resources.&lt;/p&gt;</description></item></channel></rss>