CompTIA Cloud Essentials+: Cloud Governance & Securing Data

CompTIA Cloud Essentials+    |    Intermediate
  • 18 Videos | 1h 49m 20s
  • Includes Assessment
  • Earns a Badge
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing. Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and information
    describe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirements
    recognize the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithms
    list the items in a cloud security checklist that ensure an enterprise is covering all its bases and outline best practices for implementing cloud security
    describe the objective and methods of implementing policy-based access control in cloud computing
    use AWS IAM to create roles and users and attach policies to manage authorization for AWS resources and services
    identify the value of cloud compliance and specify how to implement a compliance program in the cloud
    describe the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty
  • recall the international standards for cloud computing and the behaviors that need to be coordinated across roles and implemented consistently in a cloud computing system
    recognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scanners
    list the essential elements required to implement data security and privacy in cloud computing
    describe the concept of data confidentiality in cloud computing along with the recommended techniques to implement and secure data
    describe the layers of security that can be implemented in the cloud along with the recommended approaches for doing so
    recall the critical indicators of availability and outline the approach to implementing availability in the cloud
    describe the cloud identity logs that help track events that may have a direct impact on cloud environments and also help implement cloud audits
    recognize the data-level authorization outlined in OWASP Top 10 that can be used to secure resources
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 54s
    UP NEXT
  • Playable
    2. 
    Cloud Computing Policy and Procedures
    6m 3s
  • Locked
    3. 
    Standard Cloud Computing Operating Features
    6m 31s
  • Locked
    4. 
    Resource Management in the Cloud
    7m 39s
  • Locked
    5. 
    Cloud Security Implementation Best Practices
    5m 35s
  • Locked
    6. 
    Policy-based Access Control
    7m 40s
  • Locked
    7. 
    Applying Policies on AWS Cloud Resources
    5m 45s
  • Locked
    8. 
    Implementing a Cloud Compliance Program
    4m 52s
  • Locked
    9. 
    Data Sovereignty Implementation
    4m 31s
  • Locked
    10. 
    Cloud Computing Standards and Functional Behaviors
    7m 14s
  • Locked
    11. 
    An Integrated Vulnerability Assessment Solution
    5m 47s
  • Locked
    12. 
    Implementing Data Security in the Cloud
    6m 17s
  • Locked
    13. 
    Data Confidentiality in the Cloud
    6m 17s
  • Locked
    14. 
    Implementing Security Layers in the Cloud
    8m 43s
  • Locked
    15. 
    Implementing Cloud Availability
    5m 47s
  • Locked
    16. 
    Implementing Cloud Audits Using Identity Logs
    4m 45s
  • Locked
    17. 
    OWASP Top 10's Data-level Authorization
    4m 28s
  • Locked
    18. 
    Course Summary
    1m 33s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE