Cloud Security, Risk, and Compliance: Managing Security in the Cloud Era

Cloud    |    Intermediate
  • 16 videos | 1h 37m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 50 users Rating 4.5 of 50 users (50)
Cloud security combines technologies, policies, controls, and services to help protect cloud infrastructure, resources, and data. In this course, you'll explore the history of IT security and learn how it evolved to include cloud technologies. Discover common security threats such as cloud misconfigurations, unauthorized access, limited cloud visibility, insider threats, malware infections, and account hijacking. Explore how built-in security controls can attempt to mitigate security attacks and review cloud security data breaches from recent years, including how they were discovered and mitigated and the cost associated with resolving them. Lastly, explore how enterprises can plan for various security scenarios and why leaders should make security a key feature of their products and services.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the history of it security and how it evolved to include cloud technologies
    Recognize how cloud misconfigurations can result in cloud data breaches
    Recognize how unauthorized access can result in a cloud security breach
    Recognize how a lack of security strategy can result in a security threat
    Recognize how a lack of cloud usage visibility can impact cloud security
    Outline account hijacking and how it can threaten cloud security
    Recognize how to detect and prevent insider threats
  • Outline how distributed denial of service attacks (ddos) are on the rise and how they are used to interrupt cloud services
    Outline how insecure interfaces and application programming interfaces (apis) can leave a system vulnerable to attacks
    Identify the risks posed by malware infections
    Recognize how insufficient identity and access management (iam) policies can result in various threats
    Outline how built-in security controls can attempt to mitigate security attacks compared to older solutions
    Outline cloud security data breaches in recent years including how they were discovered and mitigated and the cost associated with each
    Recognize how enterprises can plan for various security scenarios and how leaders should make security a key feature of their products and services
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 12 users Rating 4.8 of 12 users (12)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.2 of 25 users Rating 4.2 of 25 users (25)