Configuring Cloud Security

Intermediate
  • 6 Videos | 29m 7s
  • Includes Assessment
  • Earns a Badge
Likes 10 Likes 10
Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.

WHAT YOU WILL LEARN

  • distinguish between cloud security operation models
    distinguish between cloud security service models
    describe characteristics of cloud virtualization
  • identify the legal and privacy concerns associated with cloud security
    identify secure data storage and transmission options for cloud security
    identify security requirements when outsourcing cloud services

IN THIS COURSE

  • Playable
    1. 
    Operation Models
    5m 1s
    UP NEXT
  • Playable
    2. 
    Service Models
    3m 39s
  • Locked
    3. 
    Cloud Virtualization
    2m 36s
  • Locked
    4. 
    Legal and Privacy Concerns
    5m 12s
  • Locked
    5. 
    Data Storage and Transmission
    3m 32s
  • Locked
    6. 
    Cloud Security Outsourcing Requirements
    6m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 24 Likes 24  
Likes 14 Likes 14  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 14 Likes 14  
Likes 176 Likes 176  
Likes 166 Likes 166