Cloud Security Administration: Cloud Data & Application Security

Cloud Security    |    Intermediate
  • 13 videos | 1h 1m
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)
Various applications are persisting in the cloud, proper practices have to be followed to secure their code and data. The cloud being a modular product, it has large amount of code associated and integrated into it. For this reason, proper life cycle management is required. This includes patching, encryption, and minimizing business impact, and ensuring the tools and applications are available. In this course, you'll learn about the cloud software life cycle, securing the applications, and securing access to different assets in cloud.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Work with shared services and data protection
    Perform fine-grained queries to get selective access control
    Use secure deployment practices to develop and secure cloud applications
    Describe identity access control including details on authentication and authorization
    Identify actions of iam in aws and azure
    Describe the software development life cycle and issues
  • Recognize the importance of encryption and key management
    Describe how to secure saas cloud by focusing on saas applications
    Create a business continuity plan and work on its implementation
    Identify various techniques including crypto, tokenization, data masking, and dip
    Describe drm, different data protection policies, event handing, and siem
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 41s
  • 3m 24s
    Learn how to work with shared services and data protection. FREE ACCESS
  • Locked
    3.  Microdata Access
    5m 4s
    In this video, find out how to perform queries to get selective access control. FREE ACCESS
  • Locked
    4.  Secure Deployment Practices
    4m 52s
    In this video, you will learn how to develop and secure cloud applications using secure deployment practices. FREE ACCESS
  • Locked
    5.  Identity Access Control
    4m 20s
    After completing this video, you will be able to describe identity access control, including details on authentication and authorization. FREE ACCESS
  • Locked
    6.  IAM in AWS and Azure
    3m 25s
    In this video, learn how to identify actions of IAM in AWS and Azure. FREE ACCESS
  • Locked
    7.  Life Cycle of Software
    5m 44s
    After completing this video, you will be able to describe the software development life cycle and issues related to it. FREE ACCESS
  • Locked
    8.  Encryption and Key Management
    5m 50s
    After completing this video, you will be able to understand the importance of encryption and key management. FREE ACCESS
  • Locked
    9.  SAAS Security
    4m 36s
    Upon completion of this video, you will be able to describe how to secure SAAS cloud applications. FREE ACCESS
  • Locked
    10.  Business Continuity
    9m 34s
    Learn how to create a business continuity plan and work on its implementation. FREE ACCESS
  • Locked
    11.  Supplemental Security Devices
    5m 14s
    Find out how to identify various techniques including cryptography, tokenization, data masking, and data in motion protection. FREE ACCESS
  • Locked
    12.  Data Governance
    6m 26s
    Upon completion of this video, you will be able to describe DRM, different data protection policies, event handling, and SIEM. FREE ACCESS
  • Locked
    13.  Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 40 users Rating 4.7 of 40 users (40)
Rating 4.4 of 78 users Rating 4.4 of 78 users (78)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)