Configuring Cloud Security

Intermediate
  • 6 videos | 26m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.

WHAT YOU WILL LEARN

  • Distinguish between cloud security operation models
    Distinguish between cloud security service models
    Describe characteristics of cloud virtualization
  • Identify the legal and privacy concerns associated with cloud security
    Identify secure data storage and transmission options for cloud security
    Identify security requirements when outsourcing cloud services

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Rating 4.6 of 59 users Rating 4.6 of 59 users (59)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)