Cloud Security Fundamentals: Cloud Data Security

Cloud Security    |    Beginner
  • 10 videos | 47m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
In this 10-video course, you will learn about securing cloud data-at-rest and data-in-transit by using various cryptographic mechanisms and security controls offered by the cloud service provider. To begin, you will take a look at cryptographic mechanisms, and then move on to common cryptography protocols. In the next tutorial, you will compare client-side encryption (CSE) and server-side encryption (SSE), and then examine file and database security. You will explore object storage security, examples of which would be Google Cloud Storage and Amazon's S3, before taking a look at using key management services from the cloud service provider. Observe how to define public key infrastructure (PKI), which is based on asymmetric key cryptosystems. In the final tutorial in this course, you will be examining hardware security modules, or HSM. A module is a device or a modular component or a piece of hardware that protects and manages digital keys, which can be session keys, private keys, part of a PKI. The concluding exercise entails describing cloud data security.

WHAT YOU WILL LEARN

  • Describe cryptographic mechanisms
    Describe common cryptographic protocols
    Compare client and server-side encryption
    Define file and database security
    Define object storage security
  • Classify key management services
    Define public key infrastructure
    Describe hardware security modules
    Describe cloud data security

IN THIS COURSE

  • 1m 11s
  • 10m 3s
    After completing this video, you will be able to describe cryptographic mechanisms. FREE ACCESS
  • Locked
    3.  Common Cryptographic Protocols
    9m 54s
    After completing this video, you will be able to describe common cryptographic protocols. FREE ACCESS
  • Locked
    4.  Client-side vs. Server-side Encryption
    3m 13s
    During this video, you will learn how to compare client-side and server-side encryption. FREE ACCESS
  • Locked
    5.  File and Database Security
    3m 52s
    During this video, you will learn how to define file and database security. FREE ACCESS
  • Locked
    6.  Object Storage Security
    5m 31s
    In this video, you will learn how to define object storage security. FREE ACCESS
  • Locked
    7.  Key Management Services
    4m 54s
    In this video, you will learn how to classify key management services. FREE ACCESS
  • Locked
    8.  Public Key Infrastructure
    4m 40s
    In this video, you will learn how to define a public key infrastructure. FREE ACCESS
  • Locked
    9.  Hardware Security Modules
    2m 17s
    Upon completion of this video, you will be able to describe hardware security modules. FREE ACCESS
  • Locked
    10.  Exercise: Describing Cloud Data Security
    1m 33s
    Upon completion of this video, you will be able to describe data security in the cloud. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 37 users Rating 4.7 of 37 users (37)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 66 users Rating 4.6 of 66 users (66)
Rating 4.5 of 439 users Rating 4.5 of 439 users (439)
Rating 4.5 of 386 users Rating 4.5 of 386 users (386)