Cloud Security Administration: Cloud Data & Application Security
Cloud Security
| Intermediate
- 13 videos | 1h 1m
- Includes Assessment
- Earns a Badge
Various applications are persisting in the cloud, proper practices have to be followed to secure their code and data. The cloud being a modular product, it has large amount of code associated and integrated into it. For this reason, proper life cycle management is required. This includes patching, encryption, and minimizing business impact, and ensuring the tools and applications are available. In this course, you'll learn about the cloud software life cycle, securing the applications, and securing access to different assets in cloud.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseWork with shared services and data protectionPerform fine-grained queries to get selective access controlUse secure deployment practices to develop and secure cloud applicationsDescribe identity access control including details on authentication and authorizationIdentify actions of iam in aws and azureDescribe the software development life cycle and issues
-
Recognize the importance of encryption and key managementDescribe how to secure saas cloud by focusing on saas applicationsCreate a business continuity plan and work on its implementationIdentify various techniques including crypto, tokenization, data masking, and dipDescribe drm, different data protection policies, event handing, and siemSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 41s
-
3m 24sLearn how to work with shared services and data protection. FREE ACCESS
-
5m 4sIn this video, find out how to perform queries to get selective access control. FREE ACCESS
-
4m 52sIn this video, you will learn how to develop and secure cloud applications using secure deployment practices. FREE ACCESS
-
4m 20sAfter completing this video, you will be able to describe identity access control, including details on authentication and authorization. FREE ACCESS
-
3m 25sIn this video, learn how to identify actions of IAM in AWS and Azure. FREE ACCESS
-
5m 44sAfter completing this video, you will be able to describe the software development life cycle and issues related to it. FREE ACCESS
-
5m 50sAfter completing this video, you will be able to understand the importance of encryption and key management. FREE ACCESS
-
4m 36sUpon completion of this video, you will be able to describe how to secure SAAS cloud applications. FREE ACCESS
-
9m 34sLearn how to create a business continuity plan and work on its implementation. FREE ACCESS
-
5m 14sFind out how to identify various techniques including cryptography, tokenization, data masking, and data in motion protection. FREE ACCESS
-
6m 26sUpon completion of this video, you will be able to describe DRM, different data protection policies, event handling, and SIEM. FREE ACCESS
-
49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.