Business Continuity: Cloud Integration

Cloud    |    Intermediate
  • 14 videos | 1h 3m 15s
  • Includes Assessment
  • Earns a Badge
Likes 34 Likes 34
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
    recognize key access control considerations
    list network security concepts such data and media sanitization
    list virtualization security concepts such as hypervisor and container security
    list potential threats against cloud computing infrastructure
    describe considerations when evaluating cloud service providers
  • list common cloud infrastructure components such as network, virtualization, and computer
    recognize how to analyze cloud risks
    list data security strategies such as encryption and key management
    list data discovery techniques
    describe data rights management
    describe information rights management
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 431 Likes 431  
Likes 28 Likes 28