Data Rights Management, Policies, & Event Tracing
Cloud
| Expert
- 8 videos | 34m 45s
- Includes Assessment
- Earns a Badge
In any infrastructure, it's critical to ensure authorized data access and procedure enforcement. Examine cloud data security, including rights management; retention, deletion, and archiving policies; and tracing data events.
WHAT YOU WILL LEARN
-
Define data rights objects in terms of user access control, managing roles, and role-based access options. describe the appropriate tools to implement and secure drm.Define data retention policy principles and how to develop appropriate practicesOutline principles, and how to define and manage data deletion procedure and methodologiesOutline principles, and how to define and manage data archiving procedures and methodologies
-
List event sources and associated identityDetail event recording, analyzing event data, and aspects of storage and protection of event data. define the cyclical nature of event handling and event dynamics such as optimization, managing and reacting to change, and minimizing false positive objects.Describe coc as it applies to data hosted on the cloud. understand how nonrepudiation is handled within a cloud hosting environment.Describe common storage media threats, data protection techniques and failover archtectures. the learner should describe event and perfornace data options available for the cloud service consumer
IN THIS COURSE
-
5m 28sIn this video, find out how to define data rights objects in terms of user access control, managing roles, and role-based access options. Describe the appropriate tools to implement and secure Digital Rights Management. FREE ACCESS
-
4m 21sIn this video, you will learn about data retention policy principles and how to develop appropriate practices. FREE ACCESS
-
4m 55sIn this video, you will outline principles, and how to define and manage data deletion procedures and methodologies. FREE ACCESS
-
3m 49sIn this video, you will outline principles, and how to define and manage data archiving procedures and methodologies. FREE ACCESS
-
4m 35sAfter completing this video, you will be able to list event sources and their associated identities. FREE ACCESS
-
4m 10sIn this video, you will detail event recording, analyzing event data, and aspects of storage and protection of event data. Define the cyclical nature of event handling and event dynamics such as optimization, managing and reacting to change, and minimizing false positive objects. FREE ACCESS
-
4m 29sAfter completing this video, you will be able to describe COC as it applies to data hosted on the cloud. Understand how nonrepudiation is handled within a cloud hosting environment. FREE ACCESS
-
3mUpon completion of this video, you will be able to describe common storage media threats, data protection techniques and failover architectures. The learner should describe event and performance data options available for the Cloud Service Consumer. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.