Business Continuity: Secure Cloud Computing

Intermediate
  • 14 videos | 48m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
In this 14-video course, learners will discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention. Begin by examining the requirements for business continuity strategy; recognize requirements for disaster recovery strategy, and recognize considerations when moving applications to the cloud. Learn how to differentiate between data ownership and data custody, and explore key legal considerations when moving to the cloud. Next, learn about the importance of performing a cost-benefit analysis, and then recognize the factors that can impact confidentiality, integrity, data integrity, and availability of cloud data. This leads into cloud offering services, and a look at benefits of cloud offerings such as Amazon Web Services (AWS) and Azure. Recognize functional security requirements such as portability, interoperability, and vendor lock-in. Design and plan security controls including on-premises physical controls, virtualization protection, and authorization. The final two tutorials examine the importance of retention policies and archiving procedures, and the considerations relating to traceability and accountability such as logging, event sources, and chain of custody.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List requirements for business continuity strategy
    Recognize requirements for disaster recovery strategy
    Recognize considerations when moving applications to the cloud
    Differentiate between data ownership and data custody
    Describe key legal considerations when moving to the cloud
    List the importance of performing a cost-benefit analysis
  • Recognize factors that can impact confidentiality, integrity, and availability of cloud data
    Describe the benefits of cloud offerings such as aws and azure
    List functional security requirements such as portability, interoperability, and vendor lock-in
    Design and plan security controls including on-premise physical controls, virtualization protection, and authorization
    Describe the importance of retention policies and archiving procedures
    List considerations that relate to traceability and accountability such as logging, event sources, and chain of custody
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 4m 30s
    After completing this video, you will be able to list requirements for a business continuity strategy. FREE ACCESS
  • Locked
    3.  Disaster Recovery Strategy
    5m 28s
    Upon completion of this video, you will be able to recognize requirements for a disaster recovery strategy. FREE ACCESS
  • Locked
    4.  Migrating Applications to the Cloud
    3m 27s
    After completing this video, you will be able to recognize considerations for moving applications to the cloud. FREE ACCESS
  • Locked
    5.  Data Ownership
    2m 35s
    Learn how to differentiate between data ownership and data custody. FREE ACCESS
  • Locked
    6.  Legal Considerations
    4m 24s
    Upon completion of this video, you will be able to describe key legal considerations when you move to the cloud. FREE ACCESS
  • Locked
    7.  Cost-Benefit Analysis
    3m
    After completing this video, you will be able to list the importance of performing a cost-benefit analysis. FREE ACCESS
  • Locked
    8.  Confidentiality, Integrity, and Availability
    3m 18s
    After completing this video, you will be able to recognize factors that can impact the confidentiality, integrity, and availability of cloud data. FREE ACCESS
  • Locked
    9.  Cloud Offering Services
    2m 58s
    After completing this video, you will be able to describe the benefits of cloud offerings such as Amazon Web Services and Microsoft Azure. FREE ACCESS
  • Locked
    10.  Functional Security Requirements
    4m 29s
    After completing this video, you will be able to list functional security requirements such as portability, interoperability, and vendor lock-in. FREE ACCESS
  • Locked
    11.  Security Controls
    4m 45s
    Learn how to design and plan security controls, including on-premise physical controls, virtualization protection, and authorization. FREE ACCESS
  • Locked
    12.  Retention and Archiving
    2m 55s
    After completing this video, you will be able to describe the importance of retention policies and archiving procedures. FREE ACCESS
  • Locked
    13.  Traceability and Accountability
    3m 27s
    Upon completion of this video, you will be able to list considerations that relate to traceability and accountability, such as logging, event sources, and chain of custody. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 23s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 440 users Rating 4.6 of 440 users (440)
Rating 4.5 of 57 users Rating 4.5 of 57 users (57)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 199 users Rating 4.4 of 199 users (199)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)