Configuring Cloud Security
6 Videos | 29m 7s
- Includes Assessment
- Earns a Badge
Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.
WHAT YOU WILL LEARN
distinguish between cloud security operation modelsdistinguish between cloud security service modelsdescribe characteristics of cloud virtualization
identify the legal and privacy concerns associated with cloud securityidentify secure data storage and transmission options for cloud securityidentify security requirements when outsourcing cloud services
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
COURSE CISSP: Security Operations