Cloud Data Security

Cloud
  • 14 Videos | 1h 17m 34s
  • Includes Assessment
  • Earns a Badge
Likes 66 Likes 66
As data is migrated to the Cloud, functionality and security are imperative. Examine cloud data security, including data life cycle stages, storage architectures, security strategies, discovery and classification, and privacy concerns.

WHAT YOU WILL LEARN

  • define the various life stages of cloud-hosted data assets
    define the various technologies associated with data asset security and protection
    define storage modes in a cloud computing environment, and be able to map data assets to appropriate storage mode
    define and describe potential threats associated with storage types
    define threat mitigation technology and techniques
    define encryption as it applies to cloud-hosted data
    describe key-pair management as it applies to cloud-hosted data
  • describe data masking and masking methodologies
    describe data tokenization technologies
    describe technology selection with respect to criteria. Define current and developing data protection techniques.
    list active data privacy protection legislation by jurisdiction – Data Privacy Acts/Laws
    describe data discovery and its implementation methodologies
    outline data classification and the classification of discovered sensitive data
    detail data asset mapping to data control types. Outline the application of data control on PPI, against a backdrop of relevant legislation.

IN THIS COURSE

  • Playable
    1. 
    Data Life Cycle Stages
    6m 24s
    UP NEXT
  • Playable
    2. 
    Data Asset Security and Associated Technologies
    8m 29s
  • Locked
    3. 
    Storage Types
    5m 19s
  • Locked
    4. 
    Storage Type Threat
    5m 16s
  • Locked
    5. 
    Storage Type Threat Mitigation
    4m 46s
  • Locked
    6. 
    Encryption of Data Assets
    6m 54s
  • Locked
    7. 
    Key Management
    3m 23s
  • Locked
    8. 
    Masking of Data
    3m 44s
  • Locked
    9. 
    Tokenization of Data
    3m 28s
  • Locked
    10. 
    Emerging Data Protection Technologies
    5m 8s
  • Locked
    11. 
    Personally Identifiable Information (PII) Law
    3m 42s
  • Locked
    12. 
    Data Discovery Implementation
    3m 41s
  • Locked
    13. 
    Sensitive Data Classification
    4m 41s
  • Locked
    14. 
    Data Controls and Application
    5m 40s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 226 Likes 226  
Likes 171 Likes 171  
Likes 120 Likes 120