Cloud Security Management: Architecture Security
Cloud Security
| Intermediate
- 12 videos | 1h 12m 50s
- Includes Assessment
- Earns a Badge
Cloud objects are very dynamic, so it is important to be familiar with current cloud core design, as well as cloud security and integrity. In this course, you'll learn about cloud security management. You'll examine key terms and cloud roles that can be adopted to meet client requirements. In addition, you'll explore cloud transition scenarios, how to secure the cloud perimeter, the importance of access control, common cloud threats, and cloud model security considerations. Lastly, you'll learn about the secure data life cycle, business continuity, and disaster recovery planning.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecall the steps to plan cloud security managementRecognize cloud computing definitionsClassify various cloud deployment modelsDescribe the different cloud transition scenarios and functionsRecognize how to secure the perimeter using key technologies
-
Define iam and identify the importance of access controlIdentify common threats in cloudMatch different models with security considerationsDescribe the security data life cycleDefine business continuity and dr planning including high availability and disaster recoverySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 31s
-
6m 29sAfter completing this video, you will be able to recall the steps for planning cloud security management. FREE ACCESS
-
8m 22sUpon completion of this video, you will be able to recognize cloud computing definitions. FREE ACCESS
-
3m 41sIn this video, you will classify various cloud deployment models. FREE ACCESS
-
8m 29sAfter completing this video, you will be able to describe the different cloud transition scenarios and functions. FREE ACCESS
-
6m 40sAfter completing this video, you will be able to recognize how to secure the perimeter using key technologies. FREE ACCESS
-
5m 19sIn this video, you will learn what IAM is and why access control is important. FREE ACCESS
-
5m 52sLearn how to identify common threats in the cloud. FREE ACCESS
-
13m 9sFind out how to match different models with security considerations. FREE ACCESS
-
6m 34sUpon completion of this video, you will be able to describe the security data life cycle. FREE ACCESS
-
5m 51sLearn how to define business continuity and DR planning, including high availability and disaster recovery. FREE ACCESS
-
53s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.