Cloud Security Fundamentals: Cloud Data Security
Cloud Security
| Beginner
- 10 videos | 47m 7s
- Includes Assessment
- Earns a Badge
In this 10-video course, you will learn about securing cloud data-at-rest and data-in-transit by using various cryptographic mechanisms and security controls offered by the cloud service provider. To begin, you will take a look at cryptographic mechanisms, and then move on to common cryptography protocols. In the next tutorial, you will compare client-side encryption (CSE) and server-side encryption (SSE), and then examine file and database security. You will explore object storage security, examples of which would be Google Cloud Storage and Amazon's S3, before taking a look at using key management services from the cloud service provider. Observe how to define public key infrastructure (PKI), which is based on asymmetric key cryptosystems. In the final tutorial in this course, you will be examining hardware security modules, or HSM. A module is a device or a modular component or a piece of hardware that protects and manages digital keys, which can be session keys, private keys, part of a PKI. The concluding exercise entails describing cloud data security.
WHAT YOU WILL LEARN
-
Describe cryptographic mechanismsDescribe common cryptographic protocolsCompare client and server-side encryptionDefine file and database securityDefine object storage security
-
Classify key management servicesDefine public key infrastructureDescribe hardware security modulesDescribe cloud data security
IN THIS COURSE
-
1m 11s
-
10m 3sAfter completing this video, you will be able to describe cryptographic mechanisms. FREE ACCESS
-
9m 54sAfter completing this video, you will be able to describe common cryptographic protocols. FREE ACCESS
-
3m 13sDuring this video, you will learn how to compare client-side and server-side encryption. FREE ACCESS
-
3m 52sDuring this video, you will learn how to define file and database security. FREE ACCESS
-
5m 31sIn this video, you will learn how to define object storage security. FREE ACCESS
-
4m 54sIn this video, you will learn how to classify key management services. FREE ACCESS
-
4m 40sIn this video, you will learn how to define a public key infrastructure. FREE ACCESS
-
2m 17sUpon completion of this video, you will be able to describe hardware security modules. FREE ACCESS
-
1m 33sUpon completion of this video, you will be able to describe data security in the cloud. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.