Business Continuity: Cloud Integration
Cloud
| Intermediate
- 14 videos | 1h 3m 15s
- Includes Assessment
- Earns a Badge
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the six key stages in the data lifecycle - create, store, use, share, archive, and destroyRecognize key access control considerationsList network security concepts such data and media sanitizationList virtualization security concepts such as hypervisor and container securityList potential threats against cloud computing infrastructureDescribe considerations when evaluating cloud service providers
-
List common cloud infrastructure components such as network, virtualization, and computerRecognize how to analyze cloud risksList data security strategies such as encryption and key managementList data discovery techniquesDescribe data rights managementDescribe information rights managementSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 31s
-
4m 46sUpon completion of this video, you will be able to describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy. FREE ACCESS
-
3m 2sAfter completing this video, you will be able to recognize key considerations for access control. FREE ACCESS
-
5m 10sUpon completion of this video, you will be able to list network security concepts such as data and media sanitization. FREE ACCESS
-
2m 58sAfter completing this video, you will be able to list virtualization security concepts such as hypervisor security and container security. FREE ACCESS
-
5m 29sAfter completing this video, you will be able to list potential threats to cloud computing infrastructure. FREE ACCESS
-
7m 1sAfter completing this video, you will be able to describe considerations for evaluating cloud service providers. FREE ACCESS
-
7m 2sUpon completion of this video, you will be able to list common cloud infrastructure components such as networks, virtualization, and computers. FREE ACCESS
-
8m 26sUpon completion of this video, you will be able to analyze cloud risks. FREE ACCESS
-
5m 7sUpon completion of this video, you will be able to list data security strategies, such as encryption and key management. FREE ACCESS
-
5m 5sAfter completing this video, you will be able to list data discovery techniques. FREE ACCESS
-
3m 15sAfter completing this video, you will be able to describe data rights management. FREE ACCESS
-
3m 18sUpon completion of this video, you will be able to describe information rights management. FREE ACCESS
-
1m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.