CompTIA Cloud Essentials+: Cloud Governance & Securing Data

CompTIA Cloud Essentials+
  • 18 Videos | 1h 42m 13s
  • Includes Assessment
  • Earns a Badge
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing. Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and information
    describe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirements
    recognize the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithms
    list the items in a cloud security checklist that ensure an enterprise is covering all its bases and outline best practices for implementing cloud security
    describe the objective and methods of implementing policy-based access control in cloud computing
    use AWS IAM to create roles and users and attach policies to manage authorization for AWS resources and services
    identify the value of cloud compliance and specify how to implement a compliance program in the cloud
    describe the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty
  • recall the international standards for cloud computing and the behaviors that need to be coordinated across roles and implemented consistently in a cloud computing system
    recognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scanners
    list the essential elements required to implement data security and privacy in cloud computing
    describe the concept of data confidentiality in cloud computing along with the recommended techniques to implement and secure data
    describe the layers of security that can be implemented in the cloud along with the recommended approaches for doing so
    recall the critical indicators of availability and outline the approach to implementing availability in the cloud
    describe the cloud identity logs that help track events that may have a direct impact on cloud environments and also help implement cloud audits
    recognize the data-level authorization outlined in OWASP Top 10 that can be used to secure resources
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 57s
    UP NEXT
  • Playable
    2. 
    Cloud Computing Policy and Procedures
    6m 6s
  • Locked
    3. 
    Standard Cloud Computing Operating Features
    6m 34s
  • Locked
    4. 
    Resource Management in the Cloud
    7m 41s
  • Locked
    5. 
    Cloud Security Implementation Best Practices
    5m 38s
  • Locked
    6. 
    Policy-based Access Control
    7m 43s
  • Locked
    7. 
    Applying Policies on AWS Cloud Resources
    5m 48s
  • Locked
    8. 
    Implementing a Cloud Compliance Program
    4m 55s
  • Locked
    9. 
    Data Sovereignty Implementation
    4m 34s
  • Locked
    10. 
    Cloud Computing Standards and Functional Behaviors
    7m 17s
  • Locked
    11. 
    An Integrated Vulnerability Assessment Solution
    5m 50s
  • Locked
    12. 
    Implementing Data Security in the Cloud
    6m 20s
  • Locked
    13. 
    Data Confidentiality in the Cloud
    6m 20s
  • Locked
    14. 
    Implementing Security Layers in the Cloud
    8m 46s
  • Locked
    15. 
    Implementing Cloud Availability
    5m 50s
  • Locked
    16. 
    Implementing Cloud Audits Using Identity Logs
    4m 48s
  • Locked
    17. 
    OWASP Top 10's Data-level Authorization
    4m 31s
  • Locked
    18. 
    Course Summary
    1m 36s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.