CompTIA Cloud Essentials+: Cloud Governance & Securing Data

CompTIA    |    Intermediate
  • 18 videos | 1h 41m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 71 users Rating 4.6 of 71 users (71)
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing. Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and information
    Describe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirements
    Recognize the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithms
    List the items in a cloud security checklist that ensure an enterprise is covering all its bases and outline best practices for implementing cloud security
    Describe the objective and methods of implementing policy-based access control in cloud computing
    Use aws iam to create roles and users and attach policies to manage authorization for aws resources and services
    Identify the value of cloud compliance and specify how to implement a compliance program in the cloud
    Describe the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty
  • Recall the international standards for cloud computing and the behaviors that need to be coordinated across roles and implemented consistently in a cloud computing system
    Recognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scanners
    List the essential elements required to implement data security and privacy in cloud computing
    Describe the concept of data confidentiality in cloud computing along with the recommended techniques to implement and secure data
    Describe the layers of security that can be implemented in the cloud along with the recommended approaches for doing so
    Recall the critical indicators of availability and outline the approach to implementing availability in the cloud
    Describe the cloud identity logs that help track events that may have a direct impact on cloud environments and also help implement cloud audits
    Recognize the data-level authorization outlined in owasp top 10 that can be used to secure resources
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 54s
    In this video, you’ll learn more about your instructor and the course. The course will explore cloud computing policies and guidelines for all sensitive personal and confidential business data. You will also learn about cloud computing standard operating features and the concept of resource management in cloud computing. You’ll learn about implementing data sovereignty, international standards for cloud computing, and more. Finally, you’ll discover the layers of security that can be implemented in the cloud. FREE ACCESS
  • 6m 3s
    In this video, you'll learn the cloud computing policy and guidelines that apply to personal data, sensitive personal data, and confidential business data and information. You'll learn about cloud policies for financial management, cost optimization cloud policies, cloud policies for performance management, and network security cloud policies. Finally, you'll learn to classify data and information into non-confidential and confidential categories. FREE ACCESS
  • Locked
    3.  Standard Cloud Computing Operating Features
    6m 31s
    In this video, you'll learn about cloud computing standard operating features from the perspective of business support, provisioning, configuring portability, and interoperability requirements. You'll learn more about the IT Standard Lifecycle that helps us define, profile, test, and deploy IT processes on the cloud. You'll view a diagram that explains the IT Standard Lifecycle, starting with identifying requirements and ending with deploying the identified requirement. You'll also learn about base standards and profile development. FREE ACCESS
  • Locked
    4.  Resource Management in the Cloud
    7m 39s
    In this video, you’ll learn about the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithms. You’ll begin by learning more about Cloud Resource Classification and the five essential groups that includes. You’ll discover these groups include fast computation, storage, communication, managing power and energy, and security. Finally, you’ll learn more about brokering.   FREE ACCESS
  • Locked
    5.  Cloud Security Implementation Best Practices
    5m 35s
    In this video, you'll learn more about critical cloud security checklists and discover how these can ensure an enterprise is covering its bases. You'll also learn more about the best practices to implement cloud security. You'll learn about the need to identify security risks when migrating applications to the cloud. You'll discover critical security risks, including compliance violation, identity theft, malware infections and data breaches. Then, you'll identify cloud security candidates. FREE ACCESS
  • Locked
    6.  Policy-based Access Control
    7m 40s
    In this video, you'll learn more about the objective and methods of implementing Policy-based Access Control in cloud computing. You'll learn that Policy-based Access Control offers a framework that helps handle access control workload. It also promotes digital policies that are comprised of logical rules that help evaluate user access dynamically. You'll discover the primary focus of Policy-based Access Control is on authorization component in access management. FREE ACCESS
  • Locked
    7.  Applying Policies on AWS Cloud Resources
    5m 45s
    In this video, you’ll follow a demo, using AWS IAM to create roles and users and attach policy to manage authorization to AWS resources and services. You’ll first learn more about IAM service. Following onscreen directions, you’ll log into your AWS account and then find IAM. Next, you’ll learn how to create a group and a user. You’ll then learn to attach a policy to the group, give a name to your user, and more. FREE ACCESS
  • Locked
    8.  Implementing a Cloud Compliance Program
    4m 52s
    In this video, you'll learn the value of cloud compliance and learn how to implement a compliance program in the cloud. You'll learn that cloud compliance is essential to ensure you are able to go to market with full confidence. You'll learn how to plan an in-house compliance program and go for a compliance audit. The video will review cloud compliance, which is divided into customer compliance management and service provider compliance management. FREE ACCESS
  • Locked
    9.  Data Sovereignty Implementation
    4m 31s
    In this video, you'll learn more about the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty. You'll first learn about the pillars of sovereignty in the cloud. This includes the types of sovereignty that can be implemented in the cloud. These can be classified into three different types, including data sovereignty, operational sovereignty, and software sovereignty. FREE ACCESS
  • Locked
    10.  Cloud Computing Standards and Functional Behaviors
    7m 14s
    In this video, you'll learn more about the international standards for cloud computing and behaviors that need to be coordinated across roles and implemented consistently in a cloud computing environment. You'll learn about cloud functional behavior and the three roles needed to exhibit functionality when talking about cloud computing. These include the cloud service provider, the cloud service customer, and the cloud service partner. FREE ACCESS
  • Locked
    11.  An Integrated Vulnerability Assessment Solution
    5m 47s
    Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this video, you'll recognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scanners. You'll discover that identifying vulnerability in the cloud is essential because it helps to optimize current cloud assets. You will also learn to identify evaluation criteria for vulnerability assessments. FREE ACCESS
  • Locked
    12.  Implementing Data Security in the Cloud
    6m 17s
    In this video, you'll learn more about the essential elements required to implement data security and privacy in cloud computing. You'll learn that most of an enterprise's risks can be categorized as those that impact the structure of the enterprise, or the business as an entity. You'll also learn more about customer risk categories, including: data security, technological security, compliance and audit, and physical security. FREE ACCESS
  • Locked
    13.  Data Confidentiality in the Cloud
    6m 17s
    In this video, you'll learn more about the concept of data confidentiality in cloud computing and the recommended techniques to implement and secure data. You'll discover there are different ways to manage data confidentiality, including encryption, authentication, and authorization. You'll also learn about cloud providers' security and privacy factors. You'll discover authentication and authorization refer to implementing authentication and authorization of cloud consumers by using predefined identification schemes. FREE ACCESS
  • Locked
    14.  Implementing Security Layers in the Cloud
    8m 43s
    In this video, you'll how to describe the layers of security that can be implemented in the cloud along with the recommended approaches for doing so. You'll discover that there are many ways to view security, from the perspective of multilevel classification, which is divided into three classical layers: core services, security attacks, and security and persistence. FREE ACCESS
  • Locked
    15.  Implementing Cloud Availability
    5m 47s
    In this video, you'll learn how to recall the critical indicators of implementing availability in the cloud. There are various cloud availability indicators you need to learn about, including business impact analysis, recovery time objective, recovery point objective, and the manageability goal. Finally, you'll learn about the cost of downtime and business losses that can be incurred in order to define strategies that will increase the level of cloud availability. FREE ACCESS
  • Locked
    16.  Implementing Cloud Audits Using Identity Logs
    4m 45s
    In this video, you'll learn how to describe the cloud identity logs that help track events that may have a direct impact on cloud environments . You'll learn about the areas of cloud computing that must be audited including communication, security incidents, network security, and system development or change management. FREE ACCESS
  • Locked
    17.  OWASP Top 10's Data-level Authorization
    4m 28s
    In this video, you'll learn how to recognize the data-level authorization outlined in OWASP Top 10 that can be used to secure resources. You'll learn there are different types of intrusions and security vulnerabilities that must be managed. Also, discover what kinds of standards must be adopted when you deploy your application in a cloud or in a non-cloud environment. FREE ACCESS
  • Locked
    18.  Course Summary
    1m 33s
    In this video, you’ll summarize what you’ve learned in the course. In this course, you’ve learned about the critical cloud security checklist and best practices to implement cloud security and policy-based access control in cloud computing. You’ve discovered the elements required to implement data security and privacy in cloud computing and how to create roles and users and attach policy to manage authorization to AWS resources and services. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 180 users Rating 4.5 of 180 users (180)
Rating 4.5 of 167 users Rating 4.5 of 167 users (167)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 125 users Rating 4.4 of 125 users (125)
Rating 4.4 of 146 users Rating 4.4 of 146 users (146)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)