Business Continuity: Cloud Integration

Cloud    |    Intermediate
  • 14 videos | 1h 3m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 35 users Rating 4.7 of 35 users (35)
There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the six key stages in the data lifecycle - create, store, use, share, archive, and destroy
    Recognize key access control considerations
    List network security concepts such data and media sanitization
    List virtualization security concepts such as hypervisor and container security
    List potential threats against cloud computing infrastructure
    Describe considerations when evaluating cloud service providers
  • List common cloud infrastructure components such as network, virtualization, and computer
    Recognize how to analyze cloud risks
    List data security strategies such as encryption and key management
    List data discovery techniques
    Describe data rights management
    Describe information rights management
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 31s
  • 4m 46s
    Upon completion of this video, you will be able to describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy. FREE ACCESS
  • Locked
    3.  Access Control
    3m 2s
    After completing this video, you will be able to recognize key considerations for access control. FREE ACCESS
  • Locked
    4.  Data and Media Sanitization
    5m 10s
    Upon completion of this video, you will be able to list network security concepts such as data and media sanitization. FREE ACCESS
  • Locked
    5.  Virtualization Security
    2m 58s
    After completing this video, you will be able to list virtualization security concepts such as hypervisor security and container security. FREE ACCESS
  • Locked
    6.  Common Threats
    5m 29s
    After completing this video, you will be able to list potential threats to cloud computing infrastructure. FREE ACCESS
  • Locked
    7.  Evaluating Cloud Service Providers
    7m 1s
    After completing this video, you will be able to describe considerations for evaluating cloud service providers. FREE ACCESS
  • Locked
    8.  Cloud infrastructure Components
    7m 2s
    Upon completion of this video, you will be able to list common cloud infrastructure components such as networks, virtualization, and computers. FREE ACCESS
  • Locked
    9.  Cloud Infrastructure Risk Assessment
    8m 26s
    Upon completion of this video, you will be able to analyze cloud risks. FREE ACCESS
  • Locked
    10.  Data Security Strategies
    5m 7s
    Upon completion of this video, you will be able to list data security strategies, such as encryption and key management. FREE ACCESS
  • Locked
    11.  Data Discovery and Classification
    5m 5s
    After completing this video, you will be able to list data discovery techniques. FREE ACCESS
  • Locked
    12.  Data Rights Management
    3m 15s
    After completing this video, you will be able to describe data rights management. FREE ACCESS
  • Locked
    13.  Information Rights Management
    3m 18s
    Upon completion of this video, you will be able to describe information rights management. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 5s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 139 users Rating 4.7 of 139 users (139)
Rating 4.8 of 6 users Rating 4.8 of 6 users (6)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 3.9 of 20 users Rating 3.9 of 20 users (20)
Rating 4.2 of 107 users Rating 4.2 of 107 users (107)