Cloud Computing Fundamentals: Presence & Privacy

Cloud    |    Beginner
  • 10 videos | 34m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 500 users Rating 4.5 of 500 users (500)
Security and privacy are major concerns in cloud computing. Discover the importance of understanding the presence and privacy factors when conducting business in the cloud.

WHAT YOU WILL LEARN

  • Describe presence information and how it is used in cloud systems
    Describe the components of a presence system
    Describe the processes and tools associated with a presence system
    Describe security considerations for presence systems
    Describe privacy concerns for cloud systems
  • Describe privacy policies and how they are implemented in cloud systems
    Describe the data life cycle in the context of cloud computing
    Describe data security challenges in cloud computing
    Map cloud security measures to the data life cycle stage to which they apply
    Describe methods of controlling access to data stored on the cloud

IN THIS COURSE

  • 2m 41s
    Upon completion of this video, you will be able to describe presence information and how it is used in cloud systems. FREE ACCESS
  • 2m 29s
    After completing this video, you will be able to describe the components of a presence system. FREE ACCESS
  • Locked
    3.  Presence Process and Tools
    2m 20s
    Upon completion of this video, you will be able to describe the processes and tools associated with a presence system. FREE ACCESS
  • Locked
    4.  Presence Security
    3m 37s
    Upon completion of this video, you will be able to describe security considerations for presence systems. FREE ACCESS
  • Locked
    5.  Cloud Privacy Concerns
    5m 18s
    Upon completion of this video, you will be able to describe privacy concerns for cloud systems. FREE ACCESS
  • Locked
    6.  Privacy Policies
    2m 42s
    After completing this video, you will be able to describe privacy policies and how they are implemented in cloud systems. FREE ACCESS
  • Locked
    7.  Data Life Cycle
    2m 52s
    Upon completion of this video, you will be able to describe the data life cycle in the context of cloud computing. FREE ACCESS
  • Locked
    8.  Data Security Challenges
    4m 26s
    After completing this video, you will be able to describe data security challenges in cloud computing. FREE ACCESS
  • Locked
    9.  Mapping Security Measures to the Data Life Cycle
    5m 46s
    In this video, find out how to map cloud security measures to the data life cycle stage to which they apply. FREE ACCESS
  • Locked
    10.  Exercise: Controlling Access to Cloud Data
    2m 20s
    Upon completion of this video, you will be able to describe methods of controlling access to data stored on the cloud. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 139 users Rating 4.7 of 139 users (139)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.4 of 78 users Rating 4.4 of 78 users (78)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 258 users Rating 4.4 of 258 users (258)
Rating 4.6 of 432 users Rating 4.6 of 432 users (432)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)