Cloud Security Administration: Infrastructure Planning
Cloud Security
| Intermediate
- 13 videos | 55m 31s
- Includes Assessment
- Earns a Badge
Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you'll learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the evolution of cloud including hardware, software, and server virtualizationIdentify cloud software security measures including security principles and testingClassify different types of web services including caas, iaas, maas, paas, and saasRecognize the risks and threats involved in cloud computingIdentify the different service provider risks including backdoor spoofingIdentify the importance of the physical location of the data center hosting the cloud software
-
Identify the importance of opensource software in cloud infrastructureDescribe how security policy implementation mitigates cloud security challengesDescribe the importance of encryption in and out of the cloudDescribe business high availability and continuity techniquesApply bcdr planning in various scenariosSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 47s
-
3m 24sAfter completing this video, you will be able to describe the evolution of cloud computing, including hardware, software, and server virtualization. FREE ACCESS
-
4m 36sLearn how to identify cloud software security measures, including security principles and testing. FREE ACCESS
-
6m 27sDuring this video, you will learn how to classify different types of web services, including CAAS, IAAS, MAAS, PAAS, and SAAS. FREE ACCESS
-
3m 58sAfter completing this video, you will be able to recognize the risks and threats involved in cloud computing. FREE ACCESS
-
11m 46sIn this video, find out how to identify the different risks service providers face, including backdoor spoofing. FREE ACCESS
-
4m 37sFind out how to identify the importance of the physical location of the data center hosting the cloud software. FREE ACCESS
-
3m 6sIn this video, you will learn about the importance of OpenSource software in cloud infrastructure. FREE ACCESS
-
3m 40sUpon completion of this video, you will be able to describe how security policy implementation mitigates cloud security challenges. FREE ACCESS
-
3m 8sUpon completion of this video, you will be able to describe the importance of encryption both in and out of the cloud. FREE ACCESS
-
4m 12sUpon completion of this video, you will be able to describe high availability and continuity techniques for businesses. FREE ACCESS
-
3m 54sDuring this video, you will learn how to apply BCDR planning in various scenarios. FREE ACCESS
-
57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.