CompTIA Cloud Essentials+: Cloud Governance & Securing Data
CompTIA Cloud Essentials+
| Intermediate
- 18 Videos | 1h 41m 20s
- Includes Assessment
- Earns a Badge
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing. Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and informationdescribe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirementsrecognize the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithmslist the items in a cloud security checklist that ensure an enterprise is covering all its bases and outline best practices for implementing cloud securitydescribe the objective and methods of implementing policy-based access control in cloud computinguse AWS IAM to create roles and users and attach policies to manage authorization for AWS resources and servicesidentify the value of cloud compliance and specify how to implement a compliance program in the clouddescribe the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty
-
recall the international standards for cloud computing and the behaviors that need to be coordinated across roles and implemented consistently in a cloud computing systemrecognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scannerslist the essential elements required to implement data security and privacy in cloud computingdescribe the concept of data confidentiality in cloud computing along with the recommended techniques to implement and secure datadescribe the layers of security that can be implemented in the cloud along with the recommended approaches for doing sorecall the critical indicators of availability and outline the approach to implementing availability in the clouddescribe the cloud identity logs that help track events that may have a direct impact on cloud environments and also help implement cloud auditsrecognize the data-level authorization outlined in OWASP Top 10 that can be used to secure resourcessummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 54sUP NEXT
-
2.Cloud Computing Policy and Procedures6m 3s
-
3.Standard Cloud Computing Operating Features6m 31s
-
4.Resource Management in the Cloud7m 39s
-
5.Cloud Security Implementation Best Practices5m 35s
-
6.Policy-based Access Control7m 40s
-
7.Applying Policies on AWS Cloud Resources5m 45s
-
8.Implementing a Cloud Compliance Program4m 52s
-
9.Data Sovereignty Implementation4m 31s
-
10.Cloud Computing Standards and Functional Behaviors7m 14s
-
11.An Integrated Vulnerability Assessment Solution5m 47s
-
12.Implementing Data Security in the Cloud6m 17s
-
13.Data Confidentiality in the Cloud6m 17s
-
14.Implementing Security Layers in the Cloud8m 43s
-
15.Implementing Cloud Availability5m 47s
-
16.Implementing Cloud Audits Using Identity Logs4m 45s
-
17.OWASP Top 10's Data-level Authorization4m 28s
-
18.Course Summary1m 33s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.