Cloud Data Security

Cloud    |    Expert
  • 14 videos | 1h 10m 34s
  • Includes Assessment
  • Earns a Badge
Likes 111 Likes 111
As data is migrated to the Cloud, functionality and security are imperative. Examine cloud data security, including data life cycle stages, storage architectures, security strategies, discovery and classification, and privacy concerns.

WHAT YOU WILL LEARN

  • define the various life stages of cloud-hosted data assets
    define the various technologies associated with data asset security and protection
    define storage modes in a cloud computing environment, and be able to map data assets to appropriate storage mode
    define and describe potential threats associated with storage types
    define threat mitigation technology and techniques
    define encryption as it applies to cloud-hosted data
    describe key-pair management as it applies to cloud-hosted data
  • describe data masking and masking methodologies
    describe data tokenization technologies
    describe technology selection with respect to criteria. Define current and developing data protection techniques.
    list active data privacy protection legislation by jurisdiction – Data Privacy Acts/Laws
    describe data discovery and its implementation methodologies
    outline data classification and the classification of discovered sensitive data
    detail data asset mapping to data control types. Outline the application of data control on PPI, against a backdrop of relevant legislation.

IN THIS COURSE

  • 6m 24s
    In this video, you will learn about the various life stages of cloud-hosted data assets. FREE ACCESS
  • 8m 29s
    In this video, find out how to define the various technologies associated with data asset security and protection. FREE ACCESS
  • Locked
    3.  Storage Types
    5m 19s
    In this video, you will learn how to define storage modes in a cloud computing environment, and how to map data assets to the appropriate storage mode. FREE ACCESS
  • Locked
    4.  Storage Type Threat
    5m 16s
    In this video, you will define and describe potential threats associated with different types of storage. FREE ACCESS
  • Locked
    5.  Storage Type Threat Mitigation
    4m 46s
    Learn how to define threat mitigation technologies and techniques. FREE ACCESS
  • Locked
    6.  Encryption of Data Assets
    6m 54s
    Learn how to define encryption for cloud-hosted data. FREE ACCESS
  • Locked
    7.  Key Management
    3m 23s
    After completing this video, you will be able to describe key-pair management as it applies to data hosted in the cloud. FREE ACCESS
  • Locked
    8.  Masking of Data
    3m 44s
    Upon completion of this video, you will be able to describe data masking and masking methodologies. FREE ACCESS
  • Locked
    9.  Tokenization of Data
    3m 28s
    After completing this video, you will be able to describe data tokenization technologies. FREE ACCESS
  • Locked
    10.  Emerging Data Protection Technologies
    5m 8s
    After completing this video, you will be able to describe technology selection with respect to criteria. Define current and developing data protection techniques. FREE ACCESS
  • Locked
    11.  Personally Identifiable Information (PII) Law
    3m 42s
    Upon completion of this video, you will be able to list active data privacy protection legislation by jurisdiction - Data Privacy Acts/Laws. FREE ACCESS
  • Locked
    12.  Data Discovery Implementation
    3m 41s
    Upon completion of this video, you will be able to describe data discovery and its implementation methodologies. FREE ACCESS
  • Locked
    13.  Sensitive Data Classification
    4m 41s
    Learn how to outline data classification and the classification of discovered sensitive data. FREE ACCESS
  • Locked
    14.  Data Controls and Application
    5m 40s
    Learn how to map data assets to data control types. Outline the application of data controls on PII, against a backdrop of relevant legislation. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 1445 Likes 1445  
Likes 143 Likes 143