Cloud Security Management: Architecture Security

Cloud Security    |    Intermediate
  • 12 videos | 1h 12m 50s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 28 users Rating 4.6 of 28 users (28)
Cloud objects are very dynamic, so it is important to be familiar with current cloud core design, as well as cloud security and integrity. In this course, you'll learn about cloud security management. You'll examine key terms and cloud roles that can be adopted to meet client requirements. In addition, you'll explore cloud transition scenarios, how to secure the cloud perimeter, the importance of access control, common cloud threats, and cloud model security considerations. Lastly, you'll learn about the secure data life cycle, business continuity, and disaster recovery planning.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recall the steps to plan cloud security management
    Recognize cloud computing definitions
    Classify various cloud deployment models
    Describe the different cloud transition scenarios and functions
    Recognize how to secure the perimeter using key technologies
  • Define iam and identify the importance of access control
    Identify common threats in cloud
    Match different models with security considerations
    Describe the security data life cycle
    Define business continuity and dr planning including high availability and disaster recovery
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 31s
  • 6m 29s
    After completing this video, you will be able to recall the steps for planning cloud security management. FREE ACCESS
  • Locked
    3.  Cloud Computing Definitions
    8m 22s
    Upon completion of this video, you will be able to recognize cloud computing definitions. FREE ACCESS
  • Locked
    4.  Cloud Computing Roles
    3m 41s
    In this video, you will classify various cloud deployment models. FREE ACCESS
  • Locked
    5.  Cloud Transition Scenarios and Functions
    8m 29s
    After completing this video, you will be able to describe the different cloud transition scenarios and functions. FREE ACCESS
  • Locked
    6.  Network Security and Perimeter
    6m 40s
    After completing this video, you will be able to recognize how to secure the perimeter using key technologies. FREE ACCESS
  • Locked
    7.  IAM and Access Control
    5m 19s
    In this video, you will learn what IAM is and why access control is important. FREE ACCESS
  • Locked
    8.  Common Threats
    5m 52s
    Learn how to identify common threats in the cloud. FREE ACCESS
  • Locked
    9.  Security Considerations with Cloud Models
    13m 9s
    Find out how to match different models with security considerations. FREE ACCESS
  • Locked
    10.  Cloud Secure Data Life Cycle
    6m 34s
    Upon completion of this video, you will be able to describe the security data life cycle. FREE ACCESS
  • Locked
    11.  Business Continuity and DR Planning
    5m 51s
    Learn how to define business continuity and DR planning, including high availability and disaster recovery. FREE ACCESS
  • Locked
    12.  Course Summary
    53s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 37 users Rating 4.7 of 37 users (37)
Rating 4.7 of 92 users Rating 4.7 of 92 users (92)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 28 users Rating 4.2 of 28 users (28)
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)