Secure Cloud Computing & Trusted Cloud Services

Cloud    |    Expert
  • 14 videos | 1h 17m 26s
  • Includes Assessment
  • Earns a Badge
Likes 76 Likes 76
Examine various cloud computing security methods and considerations, understand cloud design priciples, and learn to identify trusted cloud services.

WHAT YOU WILL LEARN

  • describe the encryption of cloud-hosted assets
    define access and access control to cloud-hosted assets (data, files, and resources)
    outline asset and media management with respect to deletion/removal/overwrite on a cloud platform
    define issues and solutions relating to cloud network structures
    define issues and solutions relating to cloud virtualization infrastructures
    list and describe known and common threats to cloud infrastructure and data assets
    define security considerations and responsibilities on a per Cloud Model (Category basis – IaaS, PaaS, and SaaS plus their various derivatives)
  • detail the security-based data life cycle of cloud-hosted assets (data, files, features)
    describe business continuity and disaster recovery as it applies to a cloud service
    define how a cloud deployment might be analyzed on a cost basis
    define and describe focus areas relating to the functional security of the cloud service including vendor lock-in, interoperability, portability, migration, etc.
    describe methodologies for mapping cloud service requirements to service provider certification and product certifications
    outline methodologies for mapping cloud components to appropriate or required industry certifications or industry standards
    define Cloud Service roles, categories, and services; describe data state and data asset classification with reference to security; and outline the purpose of Common Criteria

IN THIS COURSE

  • 7m
    After completing this video, you will be able to describe how to encrypt cloud-hosted assets. FREE ACCESS
  • 9m 35s
    Find out how to define access and access control to cloud-hosted assets (data, files, and resources). FREE ACCESS
  • Locked
    3.  Asset Removal and Storage Media Sanitization
    4m 58s
    Learn how to outline asset and media management with respect to deletion/removal/overwrite on a cloud platform. FREE ACCESS
  • Locked
    4.  Cloud Network Security
    6m 38s
    In this video, you will learn about issues and solutions relating to cloud network structures. FREE ACCESS
  • Locked
    5.  Security in the Virtualized Environment
    4m 46s
    In this video, you will learn how to define issues and solutions relating to cloud virtualization infrastructures. FREE ACCESS
  • Locked
    6.  Infrastructure and Data Threats
    4m 59s
    After completing this video, you will be able to list and describe known and common threats to cloud infrastructure and data assets. FREE ACCESS
  • Locked
    7.  Platform-specific security
    5m 7s
    Learn how to define security considerations and responsibilities on a per Cloud Model basis. FREE ACCESS
  • Locked
    8.  Cloud – Data Life Cycle
    6m 36s
    In this video, you will detail the security-based data life cycle of cloud-hosted assets. FREE ACCESS
  • Locked
    9.  Cloud Service Continuity
    5m 6s
    Upon completion of this video, you will be able to describe business continuity and disaster recovery as they apply to a cloud service. FREE ACCESS
  • Locked
    10.  Cloud Service Investment
    7m 4s
    In this video, you will learn how to analyze a cloud deployment on a cost basis. FREE ACCESS
  • Locked
    11.  Cloud Functional Security
    3m 38s
    During this video, you will learn how to define and describe focus areas relating to the functional security of the cloud service, including vendor lock-in, interoperability, portability, migration, etc. FREE ACCESS
  • Locked
    12.  Cloud Service Certification Assessment
    4m 23s
    After completing this video, you will be able to describe how to map cloud service requirements to service provider certification and product certifications. FREE ACCESS
  • Locked
    13.  Product Certification
    3m 55s
    In this video, you will learn how to outline methodologies for mapping cloud components to appropriate or required industry certifications or industry standards. FREE ACCESS
  • Locked
    14.  Exercise: Specifying Architectural Security
    3m 42s
    Find out how to define Cloud Service roles, categories, and services; describe data state and data asset classification with reference to security; and outline the purpose of Common Criteria. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 14 Likes 14  
Likes 199 Likes 199  
Likes 178 Likes 178