CompTIA Cloud+: Data Security & Compliance Controls

CompTIA    |    Intermediate
  • 12 videos | 1h 17m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 63 users Rating 4.3 of 63 users (63)
There may be several ramifications for failing to secure your organization's data in the cloud environment. This could also mean failing to comply with regulatory compliances. In this course, you will learn how mandatory access controls are used to secure cloud services. First, you will learn encryption, hashing algorithms, digital signatures, the access security broker and file integrity monitoring can be used to ensure data security and regulatory compliance. Next, you will learn how data classification, network and access control can be used to secure data. Next, you will learn about data security laws and regulations and the legal requirements for securely storing data. Finally, you will learn about data loss prevention and the components of records management systems including versioning, retention, destruction and write once/read many. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how mandatory access controls are used to secure cloud services
    Describe how encryption can be used for data security and compliance
    Describe how data integrity can be achieved using hashing algorithms, digital signatures and file integrity monitoring
    Describe how data classification can be used to secure data
    Describe how network segmentation can be used to secure data
  • Describe how access control can be used to secure data
    Describe the impact of laws and regulations and the legal requirements for securely storing data
    Describe the components of records management including versioning, retention, destruction and write once/read many
    Describe data loss prevention (dlp) and why is important for data security and regulatory compliance
    Describe the clouds access security broker (casb) and how it can be used for data security and compliance
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
    In this video, you’ll learn more about your instructor and the course. Here, you’ll learn how mandatory access controls are used to secure cloud services and examine encryption, hashing algorithms, digital signatures and how file integrity monitoring can be used to ensure data security. Next, you’ll discover data classification, segmentation, and access control followed by data security laws and regulatory compliance. Finally, you’ll explore data loss prevention policies and the components of records management systems. FREE ACCESS
  • 8m 22s
    In this video, you’ll learn more about mandatory access control and how it can be used to secure cloud services. You’ll learn this refers to two levels of access control, physical and logical. Physical generally refers to on-premise environments. For cloud-based customers, the primary concern is logical access, which refers to data, policies, configuration settings, or anything else that is represented in digital form. FREE ACCESS
  • Locked
    3.  Data Security Encryption
    6m 39s
    In this video, you’ll learn more about how encryption can be implemented in a cloud environment to enhance data security and meet compliance requirements. The first thing to consider is how the data finds its way into the cloud service. Is it generated when your services go live or is it a migration of existing on-premises data? If it’s migration, many cloud providers offer services to encrypt the data before transmission to the cloud. FREE ACCESS
  • Locked
    4.  Data Security Integrity
    9m 37s
    In this video, you’ll learn more about methods to protect the integrity of your data in the cloud. This includes hashing, digital signatures, and file integrity monitoring. You’ll learn hashing is a service that takes any kind of value as an input and converts the input into byte values. Next, you’ll learn digital signatures provide authentication of identities and they encrypt the data. Finally, you’ll learn file integrity monitoring ensures compliance rules are observed. FREE ACCESS
  • Locked
    5.  Data Security Classification
    5m 53s
    In this video, you’ll learn more about implementing Data Classification in a cloud environment, which can then be used to determine the kind of access an entity has to that data. Classification deals with the level of secrecy required for information. You’ll learn the classifications you use in your organization are entirely arbitrary. And along with classification comes a security clearance level that equates to each classification. FREE ACCESS
  • Locked
    6.  Data Segmentation
    6m 38s
    In this video, you’ll learn more about segmentation, or the process of separating different parts of your environment from each other by taking a larger single unit and breaking it down into smaller units. You’ll learn the most commonly implemented method is Network Segmentation, which subdivides any existing network into smaller units. This can then facilitate other methods such as Data Segmentation, User Segmentation, Processor, Application Segmentation, Protocol Segmentation, and others. FREE ACCESS
  • Locked
    7.  Data Access Control
    7m 29s
    In this video, you’ll learn more about implementing access control for data in the cloud, the primary method of protecting data. You’ll learn this determines which users are able to gain access to data. It also addresses questions like how your access methods are enforced, and how best to know which users have access versus which don't, and under which circumstances access should be denied. Managing access is a critical aspect of any cloud-based solution. FREE ACCESS
  • Locked
    8.  Regulatory Compliance
    9m 38s
    In this video, you’ll learn more about maintaining compliance with respect to data stored in the cloud. There are some common regulations that dictate measures needed to ensure your operations are compliant. You’ll learn to assure customers or the general public their data is safe, you must be consistent when it comes to data stored in the same place using the same technologies and security controls. You should also provide visibility with respect to location. FREE ACCESS
  • Locked
    9.  Data Records Management
    9m 4s
    In this video, you’ll learn more about data records management in the cloud. You’ll learn this includes four basic components. These include Retention, which determines how long information’s kept. It also includes Versioning, which provides a mechanism to maintain historical versions of data as changes occur. And Write Once Read Many, which says data classified as such must remain in an unchanged state. Finally, you’ll learn Destruction which defines processes to address levels of recoverability. FREE ACCESS
  • Locked
    10.  Data Loss Prevention
    7m 8s
    In this video, you’ll learn more about Data Loss Prevention in the cloud. You’ll learn this refers to the protection of data in terms of ensuring it does not leave the confines of your organization in an unauthorized manner. DLP policies implement Encryption to protect data at rest and in transit. It also defines activities that can or cannot be performed against that data. FREE ACCESS
  • Locked
    11.  Cloud Access Security Broker
    3m 55s
    In this video, you’ll learn more about the Cloud Access Security Broker, which is an application typically implemented between your on-site environment and your cloud infrastructure. You’ll learn it facilitates the extension of your existing on-premises security policies into your cloud subscription. This is useful for organizations who are migrating toward cloud services as opposed to starting fresh or are looking for a hybrid configuration. FREE ACCESS
  • Locked
    12.  Course Summary
    51s
    In this video, you’ll summarize what you’ve learned in the course. You’ve learned regulatory compliance and data security laws and regulations. You explored securing cloud services with mandatory access control, using data security encryption, integrity, and classification to secure data, securing data through segmentation and access control, the legal requirements for securely storing data, and components of data records management. You also learned why data loss prevention is important for security and regulatory compliance. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 164 users Rating 4.5 of 164 users (164)
Rating 4.7 of 25 users Rating 4.7 of 25 users (25)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 315 users Rating 4.5 of 315 users (315)
Rating 4.3 of 29 users Rating 4.3 of 29 users (29)
Rating 4.4 of 196 users Rating 4.4 of 196 users (196)